Search Results - (( basic integration connection algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Integrated Approach to the Reduction of Reactive Power Losses in Radial Distribution Network by Than, Khong Hon

    Published 2004
    “…The scope of study would be on the capacitor insertion in radial distribution network. An existing algorithm will be studied and an integrated approach to the reduction ofreactive power losses will be proposed. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…Furthermore, the identification data need to be monitored and transmitted to the business organizations, which are connected through the network. This has been achieved by the integration of RFID-XBee network with database connectivity through Internet of Things (IoT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Mobile application for sign language learning with real time feedback by Lee, Xiao Xu Alexis

    Published 2024
    “…Machine learning algorithms using MediaPipe and deep learning will analyse users' hand motions to provide corrections for improving technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…The design schemes of modeling adaptive and predictive FLC (APFLC) is described as follow: Basic FLC, Predictive FLC (PFLC) and APFLC. The APFLC is compared with a conventional Proportional Integral Derivative (PID) controller. …”
    Get full text
    Thesis
  11. 11

    Solar power inverter by Mohd Hafizuddin, Mohamed Ariffin

    Published 2013
    “…It is highlights the aspects of power electronic packaging concerning functional and packaging integration in solar inverter technology. Basically, it performs the conversion of the variable DC output of the Photovoltaic (PV) module(s) into a clean sinusoidal 50- or 60 Hz AC current that is then applied directly to the commercial electrical grid or to a local, off-grid electrical network. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…The results of EGWO-DV-Hop demonstrated superior localization accuracy under both topologies, the average localization error dropped up to 87.79% comparing with basic DV-Hop under C-shaped topology. The developed enhanced DWGWO-DVHop localization algorithm illustrated a favorable result with high accuracy and strong stability. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication by Yasir, Javed

    Published 2020
    “…It also achieves confidentiality, integrity and avoids any no-repudiation attack. The computational overhead shows that TLwS is at least 40% better than popular algorithm such as SeDS, UAKA-D2D, and D2D-Assist. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS) by Adnan Shahid, Khan, Yasir, Javed, Johari, Abdullah, Kartinah, Zen

    Published 2021
    “…D2D communication is an integral part of LTE-Advance and 5G cellular networks, has gained a lot of popularity in recent years as it ofers high speed, extended coverage, and ubiquitous connectivity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20