Search Results - (( java implementation rsa algorithm ) OR ( using personal study algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Employability prediction based on personality test using Naive Bayes Algorithm / Mohd Alief Mukhlis Mohd Adnin by Mohd Adnin, Mohd Alief Mukhlis

    Published 2020
    “…The purpose of this project was to identify the personality type of person that can be used for employability prediction, to design a prototype model of prediction using Naive Bayes algorithm and to test the functionality the proposed prototype. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Personalized Recommendation Classification Model of Students’ Social Well-being Based on Personality Trait Determinants Using Machine Learning Algorithms by Rochin Demong, Nur Atiqah, Shahrom, Melissa, Abdul Rahim, Ramita, Omar, Emi Normalina, Yahya, Mornizan

    Published 2023
    “…In this study, how different personality trait models compare in terms of accuracy and reliability is explored using different machine learning algorithms using the WEKA tool. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Pengesan lalu lintas dengan kaedah pemerosesan imej by Riza Atiq O.K.Rahmat, Kasmiran Jumari, Azmi Hassan, Hassan Basri

    Published 2001
    “…Recently cameras and image processing with high-speed computers were beginning to be adopted for traffic surveillance system. This study was conducted to develop efficient traffic detector using image-processing with a personal compute I: Traffic images were captured using ordinary analogue video camera and digitised using a video blastel: Four algorithms were developed i. e. algorithm for traffic counting, algorithm for vehicle classification. algorithm to determine the speed of the counted vehicles and algorithm for incident detection. …”
    Get full text
    Get full text
    Article
  12. 12

    Autonomous person-following telepresence robot using monocular camera and deep learning YOLO by Mat Lazim, Izzuddin, Sakri, Ahmad Amin Firdaus, Mauzi, Suffian At-Tsauri, Sahrim, Musab, Ramli, Liyana, Noordin, Aminurrashid

    Published 2024
    “…This study proposes an autonomous person-following TR using a monocular camera and deep-learning YOLO for person detection and distance estimation. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…This study developed a classification model using Ant Colony Optimization for predicting bankruptcy. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15
  16. 16

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…Recommendation systems use algorithms to analyze user data and provide personalized recommendations based on their past behaviour and preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm by Shaikh, Muhammad Umair, Wan Adnan, Wan Azizun, Ahmad, Siti Anom

    Published 2020
    “…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    A study on personalized recommender system using social media by Aishnivya, Balamurugan

    Published 2020
    “…This paper studies personalised recommender system using social media. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis