Search Results - (( program learning basic algorithm ) OR ( java applications rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Nazir, Faridah, Jano, Zanariah, Omar, Norliza

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…The programming performances from the treatment and control group are compared to analyze the effect of using the proposed tool in learning programming. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…There are three main programs work together. The programs are back-propagation neural network program, training and performance program and recognition program. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The A-rray: visual animation in learning structured programming / Wan Salfarina Wan Husain ,Siti Hasrinafasya Che Hassan and Wan Norliza Wan Bakar by Wan Husain, Wan Salfarina, Che Hassan, Siti Hasrinafasya, Wan Bakar, Wan Norliza

    Published 2018
    “…The visual animation is considered to be a very promising potential to aid students in learning and understanding the algorithm concept in programming. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  18. 18

    A flowchart-based multi-agent system for assisting novice programmers with problem solving activities by Hooshyar D., Ahmad R.B., Raj R.G., Nizam M.H.N.M., Yousefi M., Horng S.-J., Rugelj J.

    Published 2023
    “…In the early stages of learning computer programming, Computer Science (CS) minors share a misconception of what programming is. …”
    Article
  19. 19
  20. 20

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…By the end of the research, the animation and animation system will be introduced to show the basic process of network enhancement with the automated learning system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis