Search Results - (( developing rational method algorithm ) OR ( java applications rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Rational methods for solving first order ordinary differential equation by Fairuz, A'in Nazifa

    Published 2019
    “…On the other hand, the methods from the second class are all A-stable. Besides that, the algorithm for the proposed methods are developed with constant step size strategy, in which the strategy to compute the starting values by an existing methods is also included. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Designing of skull defect implants using C1 rational cubic Bezier and offset curves by Najihah, Mohamed, Ahmad, Abd Majid, Abd Rahni, Mt Piah, Zainul, Ahmad Rajion

    Published 2015
    “…The main objective of our study is to develop a simple method to redesign missing parts of the skull. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Ranking trapezoidal fuzzy numbers based on set theoretic indices with Hurwicz criterion / Nazirah Ramli by Ramli, Nazirah

    Published 2003
    “…This study investigates on the development of the NRI and based on that, two observations and three algorithms are created. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Miller’s algorithm for computing the Tate pairing, originally used the binary chains with corresponding point doubling operation in evaluating the rational function. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Composite slab numerical strength test method under partial connection approach by Mohammed, Kachalla, Abd. Karim, Izian, Abd. Aziz, Farah Nora Aznieta

    Published 2017
    “…Hence, a procedural algorithm lead to the development of PCS determination function using longitudinal shear estimation method by considering section slenderness and deck characteristics. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Inversion algorithm of fiber bragg grating for nanofluid flooding monitoring by Yahya, N., Nyuk, C.M., Ismail, A.F., Hussain, N., Rostami, A., Ismail, A., Ganeson, M., Ali, A.M.

    Published 2020
    “…This technique is a promising method in rational magnetophoresis toward fluid mobility via fiber Bragg grating (FBG). …”
    Get full text
    Get full text
    Article
  17. 17

    New Sequential and Parallel Division Free Methods for Determinant of Matrices by Sharmila, Karim

    Published 2013
    “…The computation times in the newly developed sequential methods were dominated by generating starter sets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…DASC-FS integrates the Adaptive Sine Cosine Algorithm (ASCA) as a search algorithm to determine the relevant features and adopts Depth Linear Discriminant Analysis (D-LDA) to identify the discriminative features that maximize class sepa ration. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Numerical Analysis of Defects Caused by Thermolysis in an Infinite Cylindrical Ceramic Moulding by Gumel, A. B., Twizell, E. H.

    Published 1999
    “…The concentration profile at a given time is computed by replacing the matrix exponential terms in this recurrence relation by a high-order Pade approximate. A parallel algorithm using two processors is developed by taking the partial fraction decomposition of the Pade approximate and a (matrix) rational expression in the recurrence relation.…”
    Get full text
    Get full text
    Article