Search Results - (( data integration case algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…In each case, the Traveling Salesman Problem-Genetic Algorithm (TSP-GA) algorithm is applied to determine a minimum total distance of RES sites integration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm by Abdolrasol M.G.M., Ker P.J., Hannan M.A., Ayob A., Tiong S.K.

    Published 2024
    “…Weather data, including wind, solar, fuel, and battery status, is integrated into the BGD algorithm for optimizing ON and OFF schedules. …”
    Conference Paper
  9. 9

    Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids by Abduh Kaid, Monir Abdullah

    Published 2009
    “…Although the IDLT model is proposed for single source, it has been applied in the case of multiple sources. The third stage integrates the proposed DLT based models with GA algorithm to solve the time consuming problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Pembangunan model regresi poisson sifar-melambung berintegrasi dalam biostatistik by Zafakali, Nur Syabiha

    Published 2018
    “…This research also emphasizes the development methodology of data analysis. The data gathered involved two major cases studies of data from patients with Thalassemia among children and the patients with dental caries problems. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Data tampering avoidance for food supply chain traceability system using blockchain technology by Rosli, Fahrulrazi

    Published 2019
    “…The results showed that the algorithm was able to preserve data integrity up to 100% accuracy.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Data integrity must be ensured before and after the data transmission. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Adopting genetic algorithm to enhance state-sensitivity partitioning by Sultan, Ammar Mohammed, Baharom, Salmi, Abd Ghani, Abdul Azim, Din, Jamilah, Zulzalil, Hazura

    Published 2015
    “…The objective of SSP is to avoid exhaustive testing of the entire data states of a module. In SSP, test cases are represented in the form of sequence of events. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Adopting genetic algorithm to enhance state-sensitivity partitioning by Mohammed Sultan, Ammar, Baharom, Salmi, Abd Ghani, Abdul Azim, Din, Jamilah, Zulzalil, Hazura

    Published 2015
    “…Genetic algorithm (GA) has been identified as the most common potential technique among several optimization techniques.Thus, GA is investigated for the integrating with the existing SSP. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Hybrid fuzzy-sliding mode observer design for estimation and advanced control of an ethylene polymerization process / Jarinah Mohd Ali by Jarinah , Mohd Ali

    Published 2017
    “…Both the second and third cases are behaving like practical cases. Polymerization reactor for producing polyethylene plant is chosen as the case study to observe the performances of both the fuzzy-SMO and the embedded integrator MPC. …”
    Get full text
    Get full text
    Get full text
    Thesis