Search Results - (( affecting implementation case algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    PID control system implementation in embedded system for DC motor speed control by Ariff, Che Mohd Noor

    Published 2008
    “…Three experiments have been done to look how much PID control algorithms affect the performances on driving actual DC motor; P1 algorithm experiment, PD algorithm experiment and PID algorithm experiment. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…The Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An improved firefly algorithm for optimal microgrid operation with renewable energy by Saleh, Syukur

    Published 2017
    “…The IFA method has been implemented using MATLAB software. The results obtained by IFA was compared to FA and other algorithms based on optimal cost, convergence characteristics and robustness to validate the effectiveness of the IFA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    An improved diabetes risk prediction framework : An Indonesian case study by Sutanto, Daniel Hartono

    Published 2018
    “…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…The algorithm is validated using two different methodologies: a simulation model in MATLAB/Simulink and hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan by Ruslan, Muhammad Hassan Firdaus

    Published 2017
    “…As train networks expand, routes complexity increases thus indirectly affecting accustomed user. Users are left to their own devices in order to figure out the best route based on their requirements. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Flock optimization algorithm-based deep learning model for diabetic disease detection improvement by Balasubramaniyan, Divager, Husin, Nor Azura, Mustapha, Norwati, Mohd Sharef, Nurfadhlina, Mohd Aris, Teh Noranis

    Published 2024
    “…Hence, the research objective is to create an improved diabetic disease detection system using a Flock Optimization Algorithm-Based Deep Learning Model (FOADLM) feature modeling approach that leverages the PIMA Indian dataset to predict and classify diabetic disease cases. …”
    Get full text
    Get full text
    Article
  16. 16

    Prototype development for embedding large amount of information using secure LSB and neural based steganography by Saleh, Basam N.

    Published 2009
    “…This approach is remarkably theoretically efficient, and this approach is the basis of this project to implement a prototype that uses this approach. In this project, for embedding, neural network with adaptive smoothing error back propagation that keeps trying to refine the Stego file until it reaches the best embedding results besides another adaptive Steganography method using concepts called main cases and sub cases. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Analysis and simulation of handoff scenario for wireless communication network / Darul Ridzuan Muhamad Halib by Muhamad Halib, Darul Ridzuan

    Published 2006
    “…It involved a brief study of the various parameters affecting the handoff procedure. It includes a Matlab implementation of the received power (with gaussian noise) versus the distance in the soft handoff case for a mobile moving between two base stations separated by distance d, along a straight line with fixed velocity. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An efficient CSMA-CA algorithm for IEEE 802.15.4 wireless sensor networks by Dahham, Zahraa, Sali, Aduwati, Mohd Ali, Borhanuddin, Jahan, Md. Saukat

    Published 2012
    “…In return, this problem affects the channel utilization and packet collisions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…Data recorded in the shortest path analysis process reveals that the evaluation and the prediction on workload performance of shortest path analysis using Dijkstra algorithm has been well implemented. It has been proven that the proposed CBR using Hash Search technique has resulted in an excellent prediction of the accuracy measurement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis