Search Results - (( developing formative study algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…From the study, it can be concluded that LZW algorithm is better than RLE algorithm in term of percentage compression. …”
    Get full text
    Get full text
    Thesis
  7. 7

    BASE: a bacteria foraging algorithm for cell formation with sequence data by Nouri, Hossein, Tang, Sai Hong, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar

    Published 2010
    “…This research work studies the first applications of this emerging novel optimization algorithm to the cell formation (CF) problem considering the operation sequence. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of a mathematical model for the prediction of chip formation instability and its verification by fuzzy logic with genetic algorithm by Ullah Patwari, Mohammed Anayet, Amin, A. K. M. Nurul, Istihyaq , M.H., Faris, Waleed Fekry

    Published 2010
    “…Apart from the primary serrated teeth, a typical instability of periodic nature, in the form of secondary saw/serrated teeth, which appear at the free edge of the chip, has been identified. Mechanism of formation of these teeth has been studied and the frequency of their formation has been determined. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Interactive jigsaw puzzle using backtracking algorithm / Amizah Mohd Kamaruzaman by Mohd Kamaruzaman, Amizah

    Published 2012
    “…Based on the initial study, the Backtracking algorithm has been chosen as the most suitable algorithm to be used to develop the jigsaw puzzle according to available time and complexity of the algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Coalition formation for throughput enhancement via one-sided matching theory by Md Tahir, Mohammad Hazwan, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2016
    “…Recently there have been numerous studies exploring the benefits of the coalition formation in a cognitive radio network and it has been shown that coalition formation tends to improve the performance of cognitive radio networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Coalition formation for throughput enhancement via one-sided matching theory by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2016
    “…Recently there have been numerous studies exploring the benefits of the coalition formation in a cognitive radio network and it has been shown that coalition formation tends to improve the performance of cognitive radio networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Improvement and application of particle swarm optimization algorithm by Deevi, Durga Praveen, Kodadi, Sharadha, Allur, Naga Sushma, Dondapati, Koteswararao, Chetlapalli, Himabindu, Perumal, Thinagaran

    Published 2025
    “…This method combines CPTD with the Genetic Algorithm and PSO (GAPSO), resulting in an effective strategy for dynamic formation reconfiguration and path optimization. …”
    Get full text
    Get full text
    Article
  13. 13

    Feature-based stereo vision relative positioning strategy for formation control of unmanned aerial vehicles by Yaghoobi, Yousef, Bahiki, Muhammad Rijaluddin, Syaril Azrad

    Published 2019
    “…In addition, several different techniques and approaches for developing the algorithm is discussed as well. As per system requirements and conducted study, the algorithm that is developed for this Vision System is based on Tracking and On-Line Machine Learning approach. …”
    Get full text
    Get full text
    Article
  14. 14

    Throughput enhancement in cognitive radio network via coalition formation using matching theory by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2015
    “…Recently there have been numerous studies exploring the benefits of the coalition formation in a cognitive radio network and it has been shown that coalition formation tends to improve the performance of cognitive radios. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
    Get full text
    Get full text
    Article
  16. 16

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    PREDICTION OF THE THERMODYNAMIC HYDRATE FORMATION CONDITIONS FOR METHANE GAS by Abbasi, A., Soomro, A.A., Hashim, F.M.

    Published 2022
    “…Thus, the developed algorithm was applied to the experimental data of gas pipeline to validate the results. …”
    Get full text
    Get full text
    Article
  18. 18

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…The study also explores the criteria for node formation and selection, proposing a multi-criterion, energyefficient routing mechanism that takes into account security and sets directions for future research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…Besides, statistical analysis and data mining techniques are difficult to be applied in eXtensible Markup Language (XML) format documents. This study introduces an alternative approach for mining XML format documents which can be modelled into tree-structured format. …”
    Get full text
    Get full text
    Thesis
  20. 20