Search Results - (( java application rsa algorithm ) OR ( user evaluation study algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor by Mat Ishor, Nur Ayuni Izlin

    Published 2019
    “…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review by Al-Qadhi, Abdulrahman K., Latip, Rohaya, Chiong, Raymond, Athauda, Rukshan, Hussin, Masnida

    Published 2025
    “…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Performance evaluation of caching placement algorithms in named data network for video on demand service by Abbas, Rasha Salem

    Published 2016
    “…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A comparative study of interactive segmentation with different number of strokes on complex images by Kok, Luong Goh, Giap, Weng Ng, Muzaffar Hamzah, Soo, See Chai

    Published 2020
    “…Therefore, the input from the user as well as the understanding of the algorithms based on the user input has an essential role in the success of interactive segmentation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon by Samaon, Azrinawati

    Published 2014
    “…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation in the midst of data sub-channel for 25, 75 and 100 users. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A study on personalized recommender system using social media by Aishnivya, Balamurugan

    Published 2020
    “…These machine learning algorithm processes the data set obtained. The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A Comparative Study of Interactive Segmentation with Different Number of Strokes on Complex Images by Goh, Kok Luong, Ng, Giap Weng, Muzaffar, Hamzah, Chai, Soo See

    Published 2020
    “…Therefore, the input from the user as well as the understanding of the algorithms based on the user input has an essential role in the success of interactive segmentation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article