Search Results - (( based content path algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Meta-Heuristic Algorithms for Learning Path Recommender at MOOC by Son, N.T., Jaafar, J., Aziz, I.A., Anh, B.N.

    Published 2021
    “…Our model can generate an appropriate learning path for learners based on their background and job goals. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks by Hussein, Wael Ali, Mohd Ali, Borhanuddin, A. Rasid, Mohd Fadlee, Hashim, Fazirulhisyam

    Published 2021
    “…This algorithm routes multimedia packets across a WSN by choosing high- throughput paths rather than always choosing the shorter path to the sink. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks by Abdulla Mogaibel, Hassen Abd-Almotaleb

    Published 2016
    “…However, as a result of contention-based nature of IEEE 802.11-based wireless mesh network, the node capacity is limited by the contention, interference caused by hidden nodes, data transmission over low rate links, and frequent interface switching. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Empirical analysis and optimization suggestions of Peking Opera audience's use intention of Kuaishou app by Shixia, Yang, Alexander, Chelum

    Published 2026
    “…The test of the moderating effect finds that Peking Opera exposure experience produces a significant moderating effect in all paths where independent variables influence usage intention, while age only exerts a specific moderating effect in the paths of effort expectancy and algorithm recommendation on usage intention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Named Data Networking (NDN) is an emerging Internet architecture that employs a pull-based, in-path caching, hop-by-hop, and multi-path transport architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    State-Aware re-configuration model for multi-radio wireless Mesh Networks by Zakaria, Omar, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Khalifa, Othman Omran, Azram, Mohammad, Goudarzi, Shidrokh, Jivanadham, Lalitha Bhavani, Zareei, Mahdi

    Published 2017
    “…In order to adapt to traffic dynamics in the network which might be caused by many factors i.e. users’ mobility, a centralized heuristic re-configuration algorithm called State-Aware Joint Routing and Channel Assignment (SA-JRCA) is proposed in this research based on our re-configuration model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    End to end performance analysis over IP RAN network / Armi Shahran Mohamad by Mohamad, Armi Shahran

    Published 2011
    “…File transfer), and real time, low latency content such as voice and video. IP RAN however takes the advantage of dynamic routing protocols which allow routing to occur and the network can 'self-heal' and find alternate paths to a destination if there is one when a node fails. …”
    Get full text
    Get full text
    Thesis