Search Results - (( java application rsa algorithm ) OR ( variable attractions selection algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Determination of tree stem volume : A case study of Cinnamomum by Noraini Abdullah

    Published 2013
    “…A modeling approach is developed which focuses on the phases in the model-building procedures, effects of interactions variables on the model, minimizing the effects of multicollinearity on the variables and recommending remedial techniques to overcome them, identification of the significant variables by removing insignificant variables, selecting the best model using the eight selection criteria (8SCs), and finally using the residual analysis to validate the chosen best model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A Fast Scheduling Algorithm for WDM Optical Networks by Cheah, Cheng Lai

    Published 2000
    “…Two variations of implementation of the scheduling algorithm have been proposed, namely the Variable Frame Size (VFS) and Limited Frame Size (LFS) schemes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm by Nurin Alya, Haris

    Published 2023
    “…Utilising the selected features, the Random Forest model is then trained to produce a robust prediction model. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Technical efficiency performance of Malaysian public research universities: Fuzzy data envelopment analysis / Saber Abdelall Mohamed Ahmed by Saber Abdelall, Mohamed Ahmed

    Published 2023
    “…Based on past research supported by scholars in higher education studies, this study three input variables selected are the number of full-time-equivalent (FTE) staff, number of full-time-equivalent students and ratio of FTE international students to FTE students. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques by Hammid, Ali Thaeer

    Published 2018
    “…In the FPSO method, the local search is performed through the modified light intensity attraction step with PSO operator. Secondly, this approach hybridizing the FA with the rough algorithm (RA), where RA is used to control the steps of randomness for the FA while optimizing the weights of the standard BPNN model. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…The result of K-means has proven the robustness of the selected features. The resulting error of offline tests of the sorting algorithm did not exceed 4.33 per cent. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…Besides, this framework offers high performance even with the challenging and high mobility scenarios related to the variability of mobility behaviour. The developed CEC-GP also includes an integrated approach that combined all clustering tasks such as cluster formation, cluster head selection, and cluster maintenance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Power prediction using the wind turbine power curve and data-driven approaches / Ehsan Taslimi Renani by Ehsan Taslimi , Renani

    Published 2018
    “…Wind energy as one of the promising energy sources, has attracted great attention because it is pollution-free and abundant. …”
    Get full text
    Get full text
    Get full text
    Thesis