Search Results - (( development concept function algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To achieve a good normalized relational schema for XML, there is a need to extend the concept of functional dependency in relations to XML and use this concept as guidance for the design. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  13. 13

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…A series of algorithms in solving the inverse problem were then developed corresponding to the forward models. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Design of Simplified Model Predictive Controller by Borhan, Mohd Ikram Solehuddin

    Published 2013
    “…SMPC algorithm for 2 x 2 system of distillation column model developed by Saniye and Suleiman (2011) is designed using MATLAB simulation. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…Five (5) Alternative Algorithm Design Techniques (AADTs) were developed and investigated for suitability in providing process planning solutions suitable for reconfigurable manufacturing. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Using laguerre functions to improve the tuning and performance of predictive functional control by Abdullah, Muhammad, Rossiter, John Anthony

    Published 2019
    “…This paper proposes a novel modification to the predictive functional control (PFC) algorithm to facilitate significant improvements in the tuning efficacy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Green network planning and operational power consumption optimization in LTE-A using artificial intelligence by Al-Samawi, Aida Ismail Ahmed

    Published 2015
    “…A cascaded multi-objective genetic algorithm network optimization (CMOGANO) is developed to optimize the network number of base station, their location and configuration in the first stage to provide full coverage. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Particle swarm optimization for neural network learning enhancement by Abdull Hamed, Haza Nuzly

    Published 2006
    “…Backpropagation (BP) algorithm is widely used to solve many real world problems by using the concept of Multilayer Perceptron (MLP). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimisation of multi-stage production-inspection stations using genetic algorithm by Hassan, Azmi, Pham, Duc Trung

    Published 2000
    “…The main goal of this work is to develop an efficient optimisation tool which will minimise the cost functions of the stated optimisation problems. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis