Search Results - (( developing developing public algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…In this project, an algorithm will be developed to predict the amount of time needed for the incoming public bus to arrive, based on the current location of the bus and the current time. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Development of lecturers' publication score algorithm / Zamali Tarmudi and Haijon Gunggut by Zamali Tarmudi, Haijon Gunggut

    Published 2016
    “…The aim of this paper is to develop a lecturers' publication score algorithm to assist UiTM Sabah in selecting winners among lecturers in terms of publication contribution. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Metadata network visualizer by Abdul Hamid, Jamaliah, Ibrahim, Hamidah, Selamat, Mohd Hasan, Abdullah, Rusli, Abdullah, Muhamad Taufiq, Nasharuddin, Nurul Amelina, Wan Isa, Wan Malini

    Published 2009
    “…The present invention is developed by firstly, developing and using an algorithm to automatically extract publication metadata, secondly, developing and utilizing a more interactive and networked visualizer to display the publication metadata, with more extensive navigational functionalities and finally by providing the option to save the metadata to a database so that search function can be executed. …”
    Get full text
    Patent
  12. 12

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…This study implemented Ant Colony Optimization Algorithm to develop classification rules for predicting the attackers of online shaming. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary by Mohd Zamary, Nurul Aida

    Published 2024
    “…This project aims to develop a decision-making support model for diabetes diagnosis and treatment recommendation using the decision tree algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi by Mohammadhadi, Almasi

    Published 2015
    “…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea by Sim, Doreen Ying Ying

    Published 2018
    “…OSA. The prediction algorithms developed are based on the OSA datasets collected mainly from the public hospitals in Selangor, Malaysia. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Balanced Stochastic Realization Algorithm For Development Of Rainfall Model by Azhari, Fahimy

    Published 2014
    “…The forecasts can be used to make decisions about whether warnings of floods should be issued to the general public in advance. In this research, Balanced Stochastic Realization (BSR) subspace algorithm is used to develop a rainfall model for Malaysia. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.] by Abdul Majid, M. M., Salleh, M. S., Abu Hashim, M. A., Ismail, N. H., Mansor, S., Abu Bakar, S. A.

    Published 2018
    “…The publication presents a controller strategy used in development of Semi Active Lateral Control (SALC) algorithm for passenger vehicle in enhancing transient handling performance using multibody co-simulation approach. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis