Search Results - (( basic relationship computer algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    CSC645 - Algorithm Analysis and Design / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics And Media

    Published 2022
    “…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  7. 7

    CSC645: Algorithm Analysis and Design / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2019
    “…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya

    Published 2022
    “…It is undeniable that a digital native must begin with at least a basic level of computer knowledge in order to manage their education and daily life. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…We proposed that a project’s functionality in the terms of function points has an approximately linear relationship to the final effort computation. The investigation had carried out on between the functionality and final effort before the model was generated. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Interval-valued fuzzy soft topology and its applications in group decision-making problems by Altwer, Mabruka Ali Juma

    Published 2022
    “…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Neural Network – A Black Box Model by Kuok, Kuok King, Chan, Chiu Po, Md. Rezaur, Rahman, Khairul Anwar, Mohamad Said, Chin Mei, Yun

    Published 2024
    “…A variety of metaheuristic algorithms have been used to train ANN, including Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Ant Colony Optimization (ACO), Tabu Search (TS), and Harmony Search (HS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18

    Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim by Hashim, Hazwani

    Published 2014
    “…The improvised GDAis able to reduce computer running time as compared to previous algorithm and able to deals with a sparse graph. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Synthesis of Heat Exchangers Network (HEN) by Revisiting the Method Based on 2nd Law of Thermodynamics by Hoo, Shean Chuan

    Published 2009
    “…Future works are including the transformation of algorithm into GAMS or other mathematical programming tools.…”
    Get full text
    Get full text
    Final Year Project
  20. 20