Search Results - (( basic case optimisation algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor by Ramli, Mohamad Raziff, Abal Abas, Zuraida, Desa, Mohammad Ishak, Zainal Abidin, Zaheera, Al Azzam, Malik Bader Hasan

    Published 2019
    “…Benchmark test function is then performed for the basic Bat Algorithm and the modified Bat Algorithm (MBA) for comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Determining optimal transportation allocation using linear programming methods / Tengku Mohd Hazimi Tuan Hassan and Maslin Masrom by Tuan Hassan, Tengku Mohd Hazimi, Masrom, Maslin

    Published 2022
    “…A case study of an operations research problem involving the optimisation of distribution costs and the effective delivery system of inventory by utilising transportation models, namely the North-West Corner Rule (NWCR), Simplex method, and Vogel's Approximation Method (VAM) are presented and discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…This assumption holds true for smooth motion but fails in the case of abrupt motion. Therefore, by considering tracking as an optimisation problem, the proposed SwATrack algorithm searches for the optimal distribution of motion model without making prior assumptions, or prior learning of the motion model. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Instance matching framework for heterogeneous semantic web content over linked data environment by Mansir, Abubakar

    Published 2021
    “…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
    Get full text
    Get full text
    Thesis
  10. 10