Search Results - (( developing technical evolution algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Navigating challenges and opportunities of machine learning in hydrogen catalysis and production processes: Beyond algorithm development by Salehmin M.N.I., Tiong S.K., Mohamed H., Umar D.A., Yu K.L., Ong H.C., Nomanbhay S., Lim S.S.

    Published 2025
    “…Hence, this comprehensive review delves into the technical, practical, and ethical considerations associated with the application of ML in HER catalyst development and HPP optimization. …”
    Review
  7. 7
  8. 8

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
    Get full text
    Get full text
    Get full text
    Book
  9. 9
  10. 10
  11. 11
  12. 12

    From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks by Anabi, Hilary K., Nordin, Rosdiadee, Abdulghafoor, Omar B., Sali, Aduwati, Mohamedou, Ahmed, Almqdshi, Abdulmajid, Abdullah, Nor Fadzillah

    Published 2017
    “…Strategies to acquire white space information is the single most significant functionality in cognitive radio networks (CRNs) and as such, it has gone some evolution to enhance information accuracy. The evolution trends are spectrum sensing, prediction algorithm and recently, geo-location database technique. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Performance analysis of hybrid renewable energy systems used for rural electrification in Malaysia / Laith Mahmoud Mohammad Halabi by Laith Mahmoud, Mohammad Halabi

    Published 2017
    “…The analysis examined the performance based on technical, economic and environmental aspects. Furthermore, the development of solar radiation prediction algorithms in addition to integrating a flexible hybrid renewable energy design are presented. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Techno-economic evaluation of off-grid hybrid renewable energy system for rural resort electrification in Malaysia / Monowar Hossain by Monowar, Hossain

    Published 2017
    “…For these purposes, the standalone ANFIS, ANFIS-PSO (particle swarm optimization),ANFIS-GA (genetic algorithm) and ANFIS-DE (differential evolution) prediction algorithms have been developed in MATLAB platform. …”
    Get full text
    Get full text
    Thesis
  15. 15