Search Results - (( developing ((program rsa) OR (program a)) algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- program rsa »
- program a »
- java »
-
1
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
2
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
3
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
4
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
5
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
6
Encryption Technology on Windows Workstation
Published 2004“…The purpose of this study is to develop a new type of encryption methodbased on RSAtechnique. …”
Get full text
Get full text
Final Year Project -
7
-
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
13
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A full programming documentation was done based on programming body modification and improvement. …”
Get full text
Get full text
Monograph -
14
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…This need to be done due to the fact that further improvement of this project will need the coding history on how the algorithm being developed thus documentation is the common practice in programming stage. …”
Get full text
Get full text
Thesis -
15
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…This course is an introduction to problem solving using a computer programming language. It emphasizes on algorithm development and writing computer programs, as well as common good practices in writing programs. …”
Get full text
Get full text
Get full text
Teaching Resource -
16
Development of dynamic programming algorithm for maintenance scheduling problem
Published 2020“…Then, the data of the maintenance team from one of the utilities provider company in Malaysia was collected to be implemented in the development of a dynamic programming algorithm. The dynamic programming model developed for this research reflected the flow of the maintenance activity of the company and implemented the model by Lieberman and Hillier (2010). …”
Get full text
Get full text
Thesis -
17
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
19
A Program To Generalize Contour Lines
Published 1994“…A complete computer program based on the developed algorithm is presented.…”
Get full text
Get full text
Article -
20
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012Get full text
Get full text
Thesis
