Search Results - (( based implementation during algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…Matlab/Simulink was used for the simulation studies. Additionally, the algorithms were digitally implemented on the dSPACE ACE1104 platform. …”
    Get full text
    Article
  7. 7

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…The accuracy rate attained is based on implementation of decision fusion using AND rule during classification. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10
  11. 11

    Zest Based Visualization for Requirements Negotiation by Alharthi, M., Salim, S.S.

    Published 2011
    “…We have formulated a conceptual diagram on which to base the design and development process of the groupware for implementing the Zest algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…The purpose of this project is initially to present an implementation of a guidance algorithm based on the geometrical analysis for the adoption of path planning problem. …”
    Get full text
    Learning Object
  13. 13
  14. 14

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A study of fluctuations in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2017
    “…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Web cluster load balancing via genetic-fuzzy based algorithm by Chin, Wen Cheong, Lim, Amy Hui Lan

    Published 2007
    “…Fuzzy set theory is used to capture the vagueness of the workload during redistribution period. Fuzzy set theory is used to capture the vagueness of the workload during redistribution period. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Fetal QRS complex Detection Algorithm for FPGA Implementation by Ibrahimy, Muhammad Ibn, Reaz, Mamun Bin Ibne, Mohd-Yasin, Faisal, Khoon, T. H., Ismail, Ahmad Faris

    Published 2005
    “…The algorithm is based on crosscorrelation, adaptive thresholding and statistical properties in the time domain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20

    A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization by Maizura, Ibrahim

    Published 2019
    “…The results indicate that, by implementing the UBACO, the weighted comprehensive complexity is reduced by 40.5% as compared to the UCON based policy proposed by Martinelli and Mori (2010). …”
    Get full text
    Get full text
    Thesis