Search Results - (( its application ((rsa algorithm) OR (tree algorithm)) ) OR ( _ application testing algorithm ))*

Refine Results
  1. 1

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. The decision tree's effectiveness and accuracy in predicting laptop prices are evaluated through rigorous testing and validation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets by Mohd Razali, Muhamad Hasbullah, Saian, Rizauddin, Yap, Bee Wah, Ku-Mahamud, Ku Ruhana

    Published 2021
    “…Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A... by Hamsani, Aqil Khairy, Mohd Bahrin, Ummu Fatihah, Wan Abdul Manan, Wan Dorishah

    Published 2023
    “…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah by Abdullah, Suzanah

    Published 2021
    “…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…This integrated web application is tested with functionality test and integration test which it succeeded both successfully fulfilling each criterion tested.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17
  18. 18
  19. 19
  20. 20

    Classification of basal stem rot disease in oil palm using dielectric spectroscopy by Al-Khaled, Al-Fadhl Yahya Khaled

    Published 2018
    “…Dielectric spectroscopy method has been identified to be able to classify plant diseases. However, studies on its application on basal stem rot (BSR) disease in oil palm are yet to be explored. …”
    Get full text
    Get full text
    Thesis