Search Results - (( developing data replication algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Design of smart waste bin and prediction algorithm for waste management in household area by Yusoff, Siti Hajar, Abdullah Din, Ummi Nur Kamilah, Mansor, Hasmah, Midi, Nur Shahida, Zaini, Syasya Azra

    Published 2018
    “…The limitation to this study is that the amount of smart waste bin should be replicated more so that all data for waste weight is directly collected from the smart waste bin.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…This research aims to develop a novel path prediction system which could keep track of the traveler during temporary shortage of actual positioning data. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor by Terence Jerome Daim

    Published 2023
    “…The developed algorithms interpret raw IR-UWB radar sensor data and associate it with specific hand gestures, addressing the core objective of gesture recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Access control model based on trust, purpose, and role in materialized view for privacy protection by Salji, Mohd Rafiz

    Published 2019
    “…This study focuses on data privacy protection in materialized view. Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Proactive multi-copy routing protocol for urban vehicular ad hoc network by Hassan, Aslinda, Bahaman, Nazrulazhar

    Published 2016
    “…The paper emphases on replicating data packets and distribute them to different relays. …”
    Get full text
    Get full text
    Get full text
    Article