Search Results - (( developing nation program algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- nation program »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Designing and Developing an Intelligent Congkak
Published 2011“…This issues can solved by programming the Congkak system based on previous work on Mancala and NN system, and then recording the performance of the related algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…The aim of this work is to address malnutrition, immune deficiency, hunger, and poverty as canvassed in United Nations Sustainable Development Goals 1 and 2 (SDGs 1 and 2). …”
Get full text
Get full text
Get full text
Article -
8
Programming Approach in Teaching Operations Research Techniques for Computer Science Students
Published 2005Get full text
Get full text
Conference or Workshop Item -
9
-
10
Poverty Classification of Central Perak Population Using Machine Learning
Published 2019“…The picture of Central Perak development reveals many families are not benefiting from national economic growth. …”
Get full text
Get full text
Final Year Project -
11
Physical and computational modeling for finite element analysis
Published 1988Get full text
Get full text
Conference or Workshop Item -
12
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV)
Published 2016Get full text
Get full text
Final Year Project -
14
-
15
Investigation of load variant under power distribution network reconfiguration using EPSO algorithm
Published 2024“…Furthermore, the test result also indicated that the EPSO algorithm produced better results in terms of convergence time compared to the conventional PSO algorithm.…”
Get full text
Get full text
Get full text
Article -
16
Fiber Wireless testbed using Universal Software Radio Peripheral (USRP)
Published 2023Conference Paper -
17
Development of an integrated scheduling model for handling equipment in automated port container terminals
Published 2014“…In this research, a mixed-integer programming model is developed which considers the integration of ALVs, Quay Cranes and Yard Cranes at automated container terminals with unlimited buffer spaces. …”
Get full text
Get full text
Thesis -
18
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Development and validation of a problem-solving instrument (multiple-choice questions) for computational thinking among trainee teachers in the Klang Valley, Malaysia
Published 2024“…Malaysia has recognized this need by embedding CT into its national curriculum, emphasizing key components such as abstraction, decomposition, pattern recognition, algorithms, logical reasoning, and evaluation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
