Search Results - (( developing emerging implementation algorithm ) OR ( java applications rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin by Ariffin, Ahmad Ashraff

    Published 2011
    “…This GPS will give the coordinates of latitude and longitude as well as the bearing angles between two positions. The algorithm of calculating the distance between these two positions also was developed by using PIC C Compiler. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman by Mohd Azman, Muhammad Qayyum

    Published 2024
    “…In response to the unprecedented challenges posed by the COVID-19 pandemic, this research project presents a systematic approach to outbreak prediction, specifically advocating for the implementation of Support Vector Machine (SVM) algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Kernel and multi-class classifiers for multi-floor wlan localisation by Abd Rahman, Mohd Amiruddin

    Published 2016
    “…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors by Yew , Tze Ee

    Published 2016
    “…As almost all finger vein recognition algorithms were implemented using software such as MATLAB which is based on general-purpose processor, the processing speed become the bottleneck of the development of finger vein recognition. …”
    Get full text
    Get full text
    Thesis
  20. 20

    BLAZEBREAKER: GAMIFY THE FLAMES by SAID MOHD NAJIB, ELIAS

    Published 2024
    “…This final year project report explores the development and implementation of a Virtual Reality (VR) simulation aimed at enhancing fire drill safety and emergency preparedness, featuring a maze environment filled with intricate pipe structures that take place in a oil refinery. …”
    Get full text
    Get full text
    Final Year Project