Search Results - (( developing small techniques algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Magnetic attitude control options for earth pointing small satellite by Mohd Suhadis, Nurulasikin

    Published 2011
    “…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…There are 6 main designs that the algorithms proposed namely the Orthogonal-Diamond Search Algorithm with Small Diamond Search Pattern (ODS-SDSP), the Orthogonal-Diamond Search Algorithm with Large Diamond Search Pattern (ODS-LDSP), the Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (DOS-SDSP), the Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (DOS-LDSP), the Modified Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (MDOS-SDSP), and the Modified Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (MDOS-LDSP). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…Then, the best BMA algorithm technique will be chosen to develop a hybrid method that varies with the motion type of the video. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    System identification of parameterized state-space model of a small scale UAV helicopter by Ismaila B., Tijani, Akmeliawati, Rini, Legowo, Ari

    Published 2012
    “…Prediction Error Modeling (PEM) algorithm has been identi�ed as an e�ective system identi�cation technique. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique by Saliman, Nur Farah Ain

    Published 2012
    “…The optimizing of optimal path trace back system for Smith-Waterman algorithm using structural modelling techniques are presented in this paper. …”
    Get full text
    Get full text
    Student Project
  16. 16

    The development of XML document retrieval using query weighting / Fauziah Mat Saat by Mat Saat, Fauziah

    Published 2005
    “…This research is focus on developing an XML documents retrieval using a query weighting algorithm in order to retrieve FTMSK official letter. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Power system stabilization based on artificial intelligent techniques: a review by Hassan, L.H., Moghavvemi, M., Mohamed, H.A.F.

    Published 2009
    “…These techniques are Artificial Neural Network (ANN), fuzzy logic, hybrid artificial intelligent, expert systems, and optimization techniques base AI such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Tabu Search (TS) algorithm, etc. …”
    Get full text
    Conference or Workshop Item
  19. 19

    Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems by Zulkifli, Musa, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2024
    “…CTT can use small values for parameters P(0), Q, and R, so CKF was developed to overcome KF and other estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Maritime radar: a review on techniques for small vessels detection by Zainuddin, Suraya, Pasya, Idnin, Abd. Rashid, Nur Emileen, Zaiaami, Nadiy, Maryam, Asiah, Raja Abdullah, Raja Syamsul Azmir, Megat Ali, Megat Syahirul Amin

    Published 2019
    “…This paper presents a review of recent techniques in maritime radar, developed to overcome this issue, discussing several aspects such as (i) system topology, (ii) radar waveforms, and (iii) detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Article