Search Results - (( developing formative does algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Empirical relationship on vortex formation and heat transfer coefficient (HTC) using synthetic jet cooling / Nawal Radhiah Mohamad Nasir by Mohamad Nasir, Nawal Radhiah

    Published 2023
    “…The ability of the vortex formation to reach the heated surface is important to maximize the HTC value and the radius of vortex formation does not play huge role if the distance between the vortex formation and the heated plate is high. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data by Mohd Rahim, Mohd Shafry

    Published 2008
    “…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Preserving the confidentiality of final examination question paper using image steganography technique / Aviefieorennia Tompell by Tompell, Aviefieorennia

    Published 2016
    “…In some countries, a centralized examination system is used and most education community does not realize the occurrence of final examination question paper leakage. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Study Of Aerodynamic Performances Of Gliders Using Computational Fluid Dynamics Analysis by Mustapa, Nabila

    Published 2019
    “…Developments in geometry modelling, surface and volume grid generation and flow simulation algorithms provide a route to accurate flow field predictions for increasingly complex and realistic format. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…Both processes were sorted by algorithms on join attributes and the sorted relations was merged. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development and characterization of parenteral nano-delivery system loaded with azithromycin by Daood, Ghaidaa S

    Published 2016
    “…With the aim of brain targeting, AZO-loaded nanoemulsions were developed utilizing high pressure homogenization with a homogenization pressure of 1000 bar for 8 cycles. …”
    Get full text
    Get full text
    Thesis