Search Results - (( based content ((method algorithm) OR (path algorithm)) ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Meta-Heuristic Algorithms for Learning Path Recommender at MOOC by Son, N.T., Jaafar, J., Aziz, I.A., Anh, B.N.

    Published 2021
    “…Our model can generate an appropriate learning path for learners based on their background and job goals. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks by Hussein, Wael Ali, Mohd Ali, Borhanuddin, A. Rasid, Mohd Fadlee, Hashim, Fazirulhisyam

    Published 2021
    “…This algorithm routes multimedia packets across a WSN by choosing high- throughput paths rather than always choosing the shorter path to the sink. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks by Abdulla Mogaibel, Hassen Abd-Almotaleb

    Published 2016
    “…However, as a result of contention-based nature of IEEE 802.11-based wireless mesh network, the node capacity is limited by the contention, interference caused by hidden nodes, data transmission over low rate links, and frequent interface switching. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Ismail, Mohd Norasri

    Published 2019
    “…In term of QoE subjective test, EnVADE algorithm score surpasses the score of other video streaming method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Abd Rahim, Mohd Hilmi Izwan

    Published 2019
    “…In term of QoE subjective test, EnVADE algorithm score surpasses the score of other video streaming method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A wavelet based watermarking algorithm for video by Hussin, Saleh, Babakr, Elsadig, Ramli, Abd Rahman, Al-Hadad, Sayed R.

    Published 2005
    “…So digital watermarking technique which aims at copyright protection of digital contents becomes more and more important, and various watermarking methods have been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The content-based method is employed more widely though. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis