Search Results - (( program using cross algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Midblock signalled pedestrian crossing : alternative controller algorithms by Chik, Abdul Aziz, Ismail, Che Ros, Hainin, Mohd. Rosli

    Published 2000
    “…The measures of performance of all algorithms are evaluated using a fully calibrated and validated simulation program. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…The Multimodal Transformer Fusion (MMTF) model uses the cross-modal attention mechanisms to combine these streams of data to produce unified emotional representations. …”
    Get full text
    Get full text
    Article
  11. 11

    Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat by Fatima, Jannat

    Published 2022
    “…Hyper-parameter tuning has been used in all the algorithms using k-fold cross validation to have the best accuracy and to avoid the over-fitting issue. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Euclidean space data projection classifier with cartesian genetic programming (CGP) by WK Wong, Gopal Lenin, Tan, Terence, Ali Chekima

    Published 2018
    “…This research work is a preliminary work which proposes an evolutionary-based classifier using a simplified Cartesian Genetic Programming (CGP) evolutionary algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan by Mohd Hanis, Rani, Abdullah, Embong

    Published 2013
    “…Using 10-fold cross validation for each algorithm, it was found that decision tree was the best algorithm with 83.6944% correctness. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems by Senawi, M. Y.

    Published 2001
    “…The correlation is used in chiller algorithms for quick and accurate prediction of compressor energy consumption. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…In addition to that,tenfold cross validation is used to validate the performance of the proposed method. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…In addition to that,tenfold cross validation is used to validate the performance of the proposed method. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization by Lee, Jesee Kar Ming

    Published 2022
    “…The objective of this research is to develop and compare various ANN spray drying coconut milk models. Firstly, using MATLAB program, the ANN model is developed based on optimized topology and is then furthered optimized by genetic algorithm (GA) and particle swarm optimization (PSO) using MINITAB program. …”
    Get full text
    Get full text
    Thesis