Search Results - (( developing current implementation algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  9. 9
  10. 10

    AGENT MEETING SCHEDULER by ZAINAL ABIDIN, NURAINI

    Published 2011
    “…A deep study of agent algorithm is conducted based on current available agent meeting scheduler from combination of software agent and algorithm data structure knowledge. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Three-phase three-level shunt active power filter with simplified synchronous reference frame by Hoon, Yap, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2016
    “…The proposed algorithm is developed and evaluated in MATLAB / Simulink. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Implementation of color filtering on FPGA by P., Sebastian, M.N.B.M., Shukor, H.H., Lo

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Design and development of sensor based traffic light system by Albagul, Abdulgani, Hrairi, Meftah, Wahyudi, Martono, Hidayathullah, M. F.

    Published 2006
    “…Hardware simulation tests were successfully performed on the algorithm implemented into a controller. The new timing scheme that was implemented promises an improvement in the current traffic light system and this system is feasible, affordable and ready to be implemented especially during peak hours. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Photovoltaic Integrated Shunt Active Power Filter with Simpler ADALINE Algorithm for Current Harmonic Extraction by Mohd Zainuri, Muhammad, Mohd Radzi, Mohd, Che Soh, Azura, Mariun, Norman, Rahim, Nasrudin Abd, Teh, Jiashen, Lai, Ching-Ming

    Published 2018
    “…A laboratory prototype was developed, and the algorithms were computed on a TMS320F28335 Digital Signal Processing (DSP) board for hardware implementation purposes. …”
    Get full text
    Get full text
    Article
  18. 18

    Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli by Ramli, Muhammad Harith

    Published 2017
    “…There are five general steps implemented to develop the prototype. From the testing conducted, it shows that Bat algorithm produced moderate performance towards gliomas grading and segmentation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Photovoltaic integrated shunt active power filter with simpler ADALINE algorithm for current harmonic extraction by Mohd Zainuri, Muhammad Ammirrul Atiqi, Mohd Radzi, Mohd Amran, Che Soh, Azura, Mariun, Norman, Abd Rahim, Nasrudin, Teh, Jiashen, Lai, Ching-Ming

    Published 2018
    “…A laboratory prototype was developed, and the algorithms were computed on a TMS320F28335 Digital Signal Processing (DSP) board for hardware implementation purposes. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah by Wan Ngah, Wan Ahmad Jailani

    Published 2013
    “…Implementation of Bug algorithm also requires assumption that the localisation for mobile robot is ideal causes the need for ideal sensor and unrealistic for real mobile robots to be implemented in real world. …”
    Get full text
    Get full text
    Thesis