Search Results - (( semantics implementation during algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…This project will be using Latent Semantic Analysis Algorithm to cope with comparisons of khutbah texts as it’s cover most of the requirement of the system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…Results show that all functions in the system is fully functioned and well-integrated plus most of the users provide good and promising feedbacks during the usability testing. As the future works, the system can be improved by applied the system using mobile apps application to make the system can have easier access and implementation of another technique such as semantic-based searching and the usage of stemming algorithm would be considered to produce more meaningful results.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Stylometric authorship balanced attribution prediction method by Mustafa, Tareef Kamil

    Published 2011
    “…The proposed SABA method is compared against three other methods using the computational approach, the Winnow algorithm method, and the Burrows-delta method. The results showed that the proposed method produces superior prediction accuracy and even provides a completely correct result during the final stage of the experiment.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Functional Connectivity Assessment on Aging Brain using Functional Near Infrared Spectroscopy (fNIRS) by Chan, Yee Ling

    Published 2017
    “…A new software algorithm has been developed to derive functional connectivity parameters. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Computer-assisted pterygium screening system: a review by Abdani, Siti Raihanah, Zulkifley, Mohd Asyraf, Shahrimin, Mohamad Ibrani, Zulkifley, Nuraisyah Hani

    Published 2022
    “…The deep learning networks have been successfully implemented for three major purposes, which are to classify an image regarding whether there is the presence of pterygium tissues or not, to localize the lesion tissues through object detection methodology, and to semantically segment the lesion tissues at the pixel level. …”
    Get full text
    Get full text
    Article