Search Results - (( ((java using) OR (data using)) conversion algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Teaching and learning via chatbots with immersive and machine learning capabilities by Nantha Kumar Subramaniam

    Published 2019
    “…In order to address these shortcomings, seven text-based conversational chatbots for the students to learn Java in an interactive and engaging manners had been built. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10
  11. 11

    Software Development For Conversion Of Ip To Wireless Atm (Watm) by Sudhakar, Swarnappa Clement

    Published 2002
    “…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…This study also aims to develop an algorithm that uses conversion of greyscale image into RGB as an approach to image processing for greyscale image. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…The process of embedding and retracting the data cause the original embedded data to be distorted as a side effect of the current method used. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Disparity between theory & practice beyond the worst-case competitive analysis by Iqbal, Javeria, Ahmad, Iftikhar, Shah, Asadullah

    Published 2019
    “…In this work, we contribute towards bridging the gap between theory and practice by considering a set of algorithms for online conversion problems and discuss the disparity between the assumed worst case competitive rations and experimentally achieved competitive ratios using real world data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17

    Simulation of elliptical core few mode fiber switch in mode division multiplexing for enhancing bandwidth performance by Zengeni, Tendai

    Published 2023
    “…This switching mechanism uses an elimination algorithm which removes unwanted modes leaving behind the ones with optimum power to propagate data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    The new efficient and accurate attribute-oriented clustering algorithms for categorical data by Qin, Hongwu

    Published 2012
    “…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A hybrid P-graph and WEKA approach in decision-making: waste conversion technologies selection by Ali, Rabiatul Adawiyah, Nik Ibrahim, Nik Nor Liyana, Wan Abdul Karim Ghani, Wan Azlina, Sani, Nor Samsiah, Hon, Loong Lam

    Published 2022
    “…The focus of this paper is to facilitate equipment selection for municipal solid waste management. P-graph was used to generate the 160 possible structures. Then, using the WEKA software, the data from the feasible structure would be processed and evaluated using the chosen algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD