Search Results - (( solution visualisation based algorithm ) OR ( program implementation rsa algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Multi-dimensional Data Visualisation using Mobile Augmented Reality by Rehman Ullah, Khan, Yin, Bee Oon, Ahmad Sofian, Shminan, Lee, Jun Choi, Chen, Jacqueline How Ting

    Published 2020
    “…Therefore, this algorithm uses AR to provide a multi-display solution for improved data visualisation after processing, summarising and classifying data. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…Creating a PSO algorithm-based infrastructure integrating with the recommendation system will further enhance solution to the design problem. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…The final outcome is a lightweight, replicable solution for secure smart agriculture systems that enhances trust, integrity, and data privacy in IoT-based farming environments.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Axis manipulation to solve Inverse Kinematics of Hyper-Redundant Robot in 3D Space by Annisa, Jamali, Sheldon Ijau, Winston

    Published 2022
    “…A solution based on inverse kinematics is required for the robot's end effector, also known as its tip, to reach a target. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Explainable artificial intelligence-based intuitionistic fuzzy network TOPSIS preference relation models for sukuk investment decisions by Wan Wahida, Wan Mustafa

    Published 2025
    “…Three explainable models were developed, namely, intuitionistic fuzzy network TOPSIS, intuitionistic fuzzypreference relation, and intuitionistic fuzzy network preference relation with a weighting algorithm. The properties of transparency were achieved through model design, while post-hoc explainability was addressed using visualisation, and the models were applied to sukuk data in selecting suitable investment alternatives. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Menu recommendation for Restoran Jannat Saba using Market Basket analysis / Dinie Sorfina Fathanah Kamarul Ariffin by Kamarul Ariffin, Dinie Sorfina Fathanah

    Published 2025
    “…By utilising the sales data, MBA is performed to uncover frequent itemsets and generate association rules based on the confidence and lift metrics. The FP-Growth algorithm has been employed for its effectiveness in identifying frequent itemsets and association rules in transactional data. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT by Lee, Chorng Huah

    Published 2025
    “…Users are guided with AR-based path visualisation, distance indicators, and voice instructions, ensuring intuitive and efficient navigation across multiple floors. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al] by Boudville, Rozan, Abdul Wahab, Afif Luqmanulhakim, Wan Zukenani, Wan Izzat Hakimi, Mohd Khelmy, Muhammad Adly Hisyam, Khiruddin, Nur Raihah

    Published 2025
    “…Data are transmitted to Firebase for cloud storage and further processed using Google Sheets for visualisation and analysis. A decision-making algorithm correlates rainfall intensity with water level changes to classify potential hazards and trigger appropriate alerts. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20