Search Results - (( using (vectorisation OR victimization) based algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An Automated System For Classifying Conference Papers by Ngan, Seon Choon Han

    Published 2021
    “…The best classification model was then deployed to a web-based research conference system. The web-based system was developed using the Django web framework, based on a system architecture defined in this project called the Enhanced 3-Tier Web-based System with a Data Mining Layer. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    The swarm-based exploration algorithm with expanded circle pattern for searching activities by Zuhri, Muhammad Fuad Reza, Zahari, Ammar, Desia, Recky, Ismail , Amelia Ritahani, Al Haek, Mohammed

    Published 2015
    “…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of a fall detection system based on neural network featuring IoT-Technology by Nik Anwar, Nik Syahrim, Ng, Yong Jie, Ng, Wei Yu, Law, Cheng Quan

    Published 2021
    “…A body temperature and heartpulse monitoring device were developed for this system to provide the medical personnel additional information on the body condition of the fall victim. Using the latest IoT-technology, the system can be connected to the internet and provides a continuous and real-time monitoring capability. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…Additionally, the results of the study indicated that the prediction model for workload performance evaluation using CBR that is optimized with Hash Search technique for determining workload data on Shortest Path analysis via the employment of Dijkstra algorithm can be useful for the prediction of incoming workload based on the status of the DBMS parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.] by Buja, Al Ya@Geogiana, Ahmad, Illiasaak, Zolkeply, Mohd Syafiq

    Published 2014
    “…Therefore, this research will propose the SEDF to overcome the problem of email spoofing. The algorithm use to match the word in the searching period in the mail header is based on The Boyer-Moore. …”
    Get full text
    Get full text
    Research Reports
  16. 16
  17. 17

    Development of eCall for Malaysia's automotive industries by Abd Musthalib, Mohd Aliff, Mansor, Hasmah, Zainal Abidin, Zulkifli

    Published 2019
    “…As such, collision detection and voice communication algorithm has been designed. For the collision detection, algorithm has been developed based on the data acquired from gyroscope and accelerometer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites by Liong, Kah Pong

    Published 2023
    “…Usually, phishing websites are created resembling legitimate sources to deceive victims. To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19
  20. 20