Search Results - (( developing partly normalization algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system by Guichi, Amar, Talha, Abdelaziz, Berkouk, El Madjid, Mekhilef, Saad, Gassab, Samir

    Published 2018
    “…This technique is based on the combination of two algorithms, the particle swarm optimization algorithm for tracking the global maximum power point, while a newly developed algorithm is used for attaining any other supervisory control set point. …”
    Get full text
    Get full text
    Article
  9. 9

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Assistive technology : Sign language translation application for hearing-impaired communication / Muhammad Amin Naim Ab Karim by Ab Karim, Muhammad Amin Naim

    Published 2020
    “…The test has two parts, the first part was demographic questions and the second part was divided into four components and consists of 13 questions. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    Article
  13. 13

    Automatic label removal from digitized weld radiographs by Soo, Say Leong, Ratnam, Mani Maran, Samad, Zahurin, Khalid, Mohd. Ashhar

    Published 2007
    “…An algorithm was developed to detect and remove labels printed onto weld radiographs before weld extraction algorithm or defect detection algorithm is applied. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  15. 15

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Software requirement specification (SRS) document is the most crucial document in software development process. SRS is normally produced during the initial part of software development process and all subsequent steps in software development are influenced by the requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis by Gunawan, Teddy Surya, Mohammad Hanafiah, Siti Amalina, Kartiwi, Mira, Ismail, Nanang, Za'bah, Nor Farahidah, Nordin, Anis Nurashikin

    Published 2017
    “…For modified image, the altered blocks should have higher error potential compred to the remaining part of the image. The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Application of Evolutionary Algorithm for Assisted History Matching by Zahari, Muhammad Izzat

    Published 2014
    “…Besides, it really demands skill and experience on the part of simulation engineer. Today, tremendous efforts are made to develop Automatic History Matching algorithms. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    The Anglerfish algorithm: a derivation of randomized incremental construction technique for solving the traveling salesman problem by Pook, Mei Foong, Ramlan, Effirul Ikhwan

    Published 2019
    “…The combination of possible solutions are rather vast and often overwhelms the limited computational power. Smart algorithms have been developed to address this issue. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Space vehicles dynamics and control by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2011
    “…This book consists of two main parts main goal of the first part is to collect and develop new attitude algorithms that build up the different scenarios acted by a spacecraft starting from the orbit injection phase. …”
    Get full text
    Get full text
    Get full text
    Book