Search Results - (( loading classification clustering algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar by Anuar, Norhasnelly

    Published 2015
    “…A lot of efforts have been made to investigate methodologies to form optimal efficiency in determining typical load profiles (TLPs), derived from various clustering and classification techniques. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An application of a novel technique for assessing the operating performance of existing cooling systems on a university campus by Abdalla, E.A.H., Nallagownden, P., Nor, N.B.M., Romlie, M.F., Hassan, S.M.

    Published 2018
    “…Two contributions in this work are: (1) the prediction of a model by using Adaptive Neuro-Fuzzy Inference System (ANFIS)-based Fuzzy Clustering Subtractive (FCS), and (2) the classification and optimization of the predicted models by using an Accelerated Particle Swarm Optimization (APSO) algorithm. …”
    Get full text
    Get full text
    Article
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…The main objective of this study is to identify the demand patterns and optimizing the lecturer’s contribution by maintaining a class sizes of maximum number of students in each class is 30 and a teaching load of up to 20 credit hours per lecturer. An Expectation-Maximization (EM) clustering model revealed five distinct clusters representing varied course demand concentrations and faculty distributions, with Cluster 1 (30%) showing the highest cumulative demand across university courses. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…A new method to initialize the clustering centers was also proposed to improve the results of segmentation. …”
    Get full text
    Get full text
    Book Section
  11. 11

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…A new method to initialize the clustering centers was also proposed to improve the results of segmentation. …”
    Get full text
    Get full text
    Thesis