Search Results - (( visualization implications from algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…It reviews the publication from the Scopus database. Based on the search process done on 14 February 2023 using the keywords of root growth algorithm, this article managed to gather 1836 articles from 1976-2023. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
    Get full text
    Get full text
    Article
  8. 8

    The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates by Eu, Jin Hau

    Published 2025
    “…This study investigates the increasing popularity of Xiaohongshu (RedNote) as the primary information hub among Malaysian university students, indicating a behavioural shift away from traditional search engines like Google. Xiaohongshu, once a Chinese e-commerce and lifestyle platform, has transformed into a dynamic space for peer-generated content that combines community interaction, visual storytelling, and authenticity. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Uncovering user perceptions toward digital banks in Indonesia: A Naïve Bayes sentiment analysis of twitter data by Karmagatri, Mulyani, Aziz, Clarisa Fezia Amanda, Asih, Wini Rizki Purnama, Jumbri, Isma Addi

    Published 2023
    “…The subsequent stages involved classification using the Naïve Bayes algorithm and word cloud visualization to identify the most commonly used words based on user responses. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Predicting saliency existence using reduced salient features based on compactness and boundary cues by Nadzri, Nur Zulaikhah

    Published 2020
    “…The selected salient features were trained, tested and compared on 3 learning algorithms which included generalised linear regression, Naïve Bayes, and Support Vector Machine. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Using the line array representation as an alternative method for understanding whole number multiplication among primary students by Chai, Chin Pheng

    Published 2015
    “…Using line array, students were capable of inventing own procedures, solving MDM from the left to the right (thousands, hundreds, tens and units) obviously opposes the traditional algorithm of working from right to left. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Expression and association of miR-181a and miR-663 and their target genes in head and neck cancer by Masood, Yaghma

    Published 2018
    “…The precision of predictions by all the algorithms for hsa-miR-181a-2-3p and hsa-miR-663 targets was low. …”
    Get full text
    Get full text
    Thesis
  16. 16