Search Results - (( java implementation rsa algorithm ) OR ( using personal study algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…This algorithm is beneficial for decision making using information visualization in which personality traits of the user are heavily inclined. …”
Get full text
Get full text
Get full text
Thesis -
7
Employability prediction based on personality test using Naive Bayes Algorithm / Mohd Alief Mukhlis Mohd Adnin
Published 2020“…The purpose of this project was to identify the personality type of person that can be used for employability prediction, to design a prototype model of prediction using Naive Bayes algorithm and to test the functionality the proposed prototype. …”
Get full text
Get full text
Thesis -
8
-
9
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
10
Personalized Recommendation Classification Model of Students’ Social Well-being Based on Personality Trait Determinants Using Machine Learning Algorithms
Published 2023“…In this study, how different personality trait models compare in terms of accuracy and reliability is explored using different machine learning algorithms using the WEKA tool. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Pengesan lalu lintas dengan kaedah pemerosesan imej
Published 2001“…Recently cameras and image processing with high-speed computers were beginning to be adopted for traffic surveillance system. This study was conducted to develop efficient traffic detector using image-processing with a personal compute I: Traffic images were captured using ordinary analogue video camera and digitised using a video blastel: Four algorithms were developed i. e. algorithm for traffic counting, algorithm for vehicle classification. algorithm to determine the speed of the counted vehicles and algorithm for incident detection. …”
Get full text
Get full text
Article -
12
Autonomous person-following telepresence robot using monocular camera and deep learning YOLO
Published 2024“…This study proposes an autonomous person-following TR using a monocular camera and deep-learning YOLO for person detection and distance estimation. …”
Get full text
Get full text
Get full text
Article -
13
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…This study developed a classification model using Ant Colony Optimization for predicting bankruptcy. …”
Get full text
Get full text
Student Project -
14
Autonomous Person-following Telepresence Robot Using Monocular Camera And Deep Learning Yolo
Published 2024Get full text
journal::journal article -
15
-
16
A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences
Published 2025“…Recommendation systems use algorithms to analyze user data and provide personalized recommendations based on their past behaviour and preferences. …”
Get full text
Get full text
Get full text
Thesis -
17
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
A study on personalized recommender system using social media
Published 2020“…This paper studies personalised recommender system using social media. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
