Search Results - (( developing devices using algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…The study is divided into three stages which are developing heating element stage, developing algorithm for heat sensing stage and developing algorithm for data transmitting stage. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    DC motor control using LQR algorithm by Adezeno, Sagoli Olid

    Published 2008
    “…A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    A parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2009
    “…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This research aims are to develop an open-source Arduino based sEMG data acquisition device by formulating hybrid automata algorithm to differentiate MUAP activity during wheelchair propulsion. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Automated content sizing using accelerometer by Ng, Yun Hao

    Published 2014
    “…In this research, algorithm is developed to track the value changed in Z-axis when user moved the mobile device. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa by Esa, Abdul Halim

    Published 2016
    “…These newly developed algorithms convert unmeasurable image to measureable image using image processing technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…Storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now widely used in everyday appliances. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    A genetic algorithm based student attendance management system with biometric identification / Mohammad Hanif Rashid by Rashid, Mohammad Hanif

    Published 2014
    “…Using a biometric device, together with our proposed system using Genetic Algorithm, it was shown that the method has achieved its objectives which helps in managing attendance recording process efficiently.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…Then, the pixelated line segments are connected to form single/multiple contour loops using contour loop algorithm. The results of each algorithms are thoroughly evaluated. …”
    Get full text
    Get full text
    Research Report
  20. 20

    Implementation of a parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2014
    “…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Get full text
    Article