Search Results - (( variable validation using algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…Validation for the model is analyzed by using validation testing data and cross validation. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Taguchi?s T-method with Normalization-Based Binary Bat Algorithm by Marlan Z.M., Jamaludin K.R., Harudin N.

    Published 2025
    “…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. …”
    Conference paper
  8. 8
  9. 9

    Numerical algorithm of block method for general second order ODEs using variable step size by Nazreen Waeleh, Zanariah Abdul Majid

    Published 2017
    “…Five numerical examples are considered and some comparisons are made with the existing methods for demonstrating the validity and reliability of the proposed algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Numerical algorithm of block method for general second order ODEs using variable step size by Waeleh, Nazreen, Abdul Majid, Zanariah

    Published 2017
    “…Five numerical examples are considered and some comparisons are made with the existing methods for demonstrating the validity and reliability of the proposed algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…In dealing with correlated variables, PCA was embedded in the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…The SURE-Autometrics is also validated using two sets of real data by comparing the forecast error measures with five model selection algorithms and three non-algorithm procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Automatic control of flotation process using computer vision by Saravani, Ali Jahed

    Published 2015
    “…The performance of improved marker based watershed algorithm was validated by using several industrial and laboratory froth images. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Independent And Dependent Job Scheduling Algorithms Based On Weighting Model For Grid Environment by M. Al-Najjar, Hazem

    Published 2018
    “…The results have demonstrated that the categorical and continuous variables of jobs can be used to improve the total execution time and average waiting time of job scheduling algorithms with less overhead in a real environment.…”
    Get full text
    Get full text
    Thesis
  15. 15

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    Predicting dengue transmission rates by comparing different machine learning models with vector indices and meteorological data by Ong, Song Quan, Pradeep Isawasan, Ahmad Mohiddin Mohd Ngesom, Hanipah Shahar, As’malia Md Lasim, Gomesh Nair

    Published 2023
    “…Previous work has focused only on specific weather variables and algorithms, and there is still a need for a model that uses more variables and algorithms that have higher performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…Whereas, the validation from the real-world of the two datasets showed that the new augmentation algorithm steadily producing lesser iteration number compared to the conventional Simplex, QSM and BLSA algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail by Ismail, Muhamad Faiz

    Published 2014
    “…We generalize the approach by proposing a framework such that the technique can be applied to a large range of DP problems. Finally, we validate the proposed DP framework using the Smith-Waterman (SW) algorithm, which is a widely used, computation and data intensive application in bioinformatics. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evaluating enhanced predictive modeling of foam concrete compressive strength using artificial intelligence algorithms by Abdellatief M., Wong L.S., Din N.M., Mo K.H., Ahmed A.N., El-Shafie A.

    Published 2025
    “…Additionally, parametric and sensitivity analyses were used to assess the performance of the GPR and LR algorithms. …”
    Article