Search Results - (( developing formative needs algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
    Get full text
    Get full text
    Article
  7. 7

    A New Cell Formation Method Considering Operation Sequences And Production Volumes by Abedini, Panteha

    Published 2013
    “…This research, presents an algorithm for cell formation to minimize intercellular movements. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The use of the Bayesian approach in the formation of the student's competence in the ICT direction by Seisenbekova, Perizat, Shayakhmetova, Asem, Othman, Mohamed

    Published 2019
    “…The paper gives a small introduction about the competence of students and explores the possibility of using Bayesian networks in the formation of the competence of an IT trainer. Developed an integrated algorithm for the formation of the competence of training in the direction of IT.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…Next, developed an auto-formation group chatting where to create online group chat for nearby users and last but not least create an instant messaging for private chatting between users. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm by Zainudin, Azlan

    Published 2018
    “…The excessive cost and time consumed is a main issue if high number of experiments need to be performed. Primarily, this research is about the optimization of triaxial ceramic employing the POFA process by the Taguchi design and Flower Pollination Algorithm (FPA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Automatic assessment for engineering drawing by Goh, K.N., Mohd. Shukri, S.R., Manao, R.B.H.

    Published 2013
    “…This method is tedious as algorithms need to be developed for each shape to be assessed. …”
    Get full text
    Get full text
    Article
  13. 13

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
    Get full text
    Get full text
    Thesis
  15. 15

    SNR Based DSDV Routing Protocol for MANET by Mohd Fairuz, Muhamad Fadzil

    Published 2012
    “…In this project the Signal-to-Noise (SNR) based routing protocol has been adapted into the standard Destination Sequenced Distance Vector (DSDV) routing algorithm by developing an algorithm to calculate the cumulative average SNR from source to destination and apply the algorithm in the DSDV routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm by Mohd Sabri, Nor Amalina

    Published 2015
    “…Furthermore, the shortest path algorithm needed additional features to produce better result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…However we need to deal with thehierarchical nature of XML and to define XFDs in this structure. …”
    Get full text
    Get full text
    Journal
  18. 18

    Estimating the optimal threshold value for foreign investment in Malaysia / Noorzahirah Mohd Sidek and Mahadzir Ismail by Mohd Sidek, Noorzahirah, Ismail, Mahadzir

    Published 2012
    “…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries. …”
    Get full text
    Get full text
    Research Reports
  19. 19

    Designated Path Routing Algorithm For Dense Wireless Sensor Network by Subramaniam, Siva Kumar, Ikhwan Lee, Mohamad Yusry Lee, Feroz, Farah Shahnaz, Azman, Amierul Syazrul Azril

    Published 2021
    “…Due to extensive pipeline dissemination in the oil and gas refinery, the nodes need to be placed in a grid formation. As such, since most oil and gas industry applications require continuous data gathering, a heavy data stream will be introduced in the network traffic, mainly when the network density is high. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Hybrid BLEU Algorithm For Structured Exam Management System by Zulhana, Zulkifle

    Published 2008
    “…Due to this problem, "Hybrid BLEU algorithm for Structured Exam Management System " is develop to aid the lecturers during assessment in the construction of quiz and test. …”
    Get full text
    Get full text
    Get full text
    Thesis