Search Results - (( using (gamification OR modification) learning algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Open access for gamification: a systematic review of literature across disciplines by Zakaria, Noor Syamilah, Saripan, M. Iqbal, Subarimaniam, Neerushah, Ismail, Alyani

    Published 2020
    “…With the increasing need for developing effective learning methods, gamification has been widely used as a tool to improve the desire and interest in learning. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Gamification of Regional Tourism Engagement: Analysis and Design of a Web-Based Information System by Johannes Hamonangan, Siregar, Rufman Iman, Akbar, Augury, El Rayeb, Chaerul, Anwar, Suriati Khartini, Jali, Mohamad Imran, Bandan, Phei Chin, Lim, Abby Lian, Hendrick

    Published 2025
    “…The system integrates a structured gamification algorithm with a scalable relational database model, built using React.js and Firebase, to ensure responsive and consistent user experiences. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  8. 8

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…The knowledge will be stored, used, referred, postulated and reasoned with. Those activities define learning in its own specific domain and context. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications by Uddin I., Awan H.H., Khalid M., Khan S., Akbar S., Sarker M.R., Abdolrasol M.G.M., Alghamdi T.A.H.

    Published 2025
    “…Among the applied machine learning algorithms, the XGBoost ensemble model using the tenfold cross-validation test achieved improved results than existing state-of-the-art models. …”
    Article
  11. 11
  12. 12

    Different mutation and crossover set of genetic programming in an automated machine learning by Masrom, S., Mohamad, M., Hatim, S.M., Baharun, N., Omar, N., Abd. Rahman, A.S.

    Published 2020
    “…Automated machine learning is a promising approach widely used to solve classification and prediction problems, which currently receives much attention for modification and improvement. …”
    Get full text
    Get full text
    Article
  13. 13

    Different mutation and crossover set of genetic programming in an automated machine learning by Masrom, S., Mohamad, M., Hatim, S.M., Baharun, N., Omar, N., Abd. Rahman, A.S.

    Published 2020
    “…Automated machine learning is a promising approach widely used to solve classification and prediction problems, which currently receives much attention for modification and improvement. …”
    Get full text
    Get full text
    Article
  14. 14

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Learning to filter text in forum message by Sainin, Mohd Shamrie

    Published 2005
    “…In this paper, the modification of the algorithm including pre-processing and classification will be discussed in the attempt to apply learning to filter forum messages.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A new variant of black hole algorithm based on multi population and levy flight for clustering problem by Haneen Abdul Wahab, Abdul Raheem

    Published 2020
    “…Furthermore, the results revealed a high convergence rate, upon which the algorithm’s performance was subjected to data clustering problems and investigated using six real datasets. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…To anticipate occurrences, ML methods such as Decision Trees, Neural Networks, K-Nearest Neighbors, and Impact Learning are being utilized, and their performance is compared based on the data processing and modification used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An approach to improve functional link neural network training using modified artificial bee colony for classification task by Yana Mazwin Mohmad Hassim, Rozaida Ghazali

    Published 2013
    “…To overcome this, a Functional Link Neural Networks (FLNN), which has single layer of trainable connection weight is used. The standard method for tuning the weight in FLNN is using a Backpropagation (BP) learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article