Search Results - (( development filled function algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    A Novel Discrete Filled Function Algorithm in Solving Discrete Optimization Problems (S/O: 12408) by Woon, Siew Fang, Karim, Sharmila, Mohamad, Mohd Saiful Adli

    Published 2016
    “…We focus our study on a recently developed method known as discrete filled function method. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Estimation of photovoltaic models using an enhanced Henry gas solubility optimization algorithm with first-order adaptive damping Berndt-Hall-Hall-Hausman method by Ramachandran, Murugan, Sundaram, Arunachalam, Ridha, Hussein Mohammed, Mirjalili, Seyedali

    Published 2024
    “…To address the existing theoretical gap, this study focused on developing an objective function that accurately estimates the initial root parameters of Photovoltaic (PV) models. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Chaos search in fourire amplitude sensitivity test by Koda, Masato

    Published 2012
    “…This paper explores the characterization of learning functions involved in FAST and derives the underlying dynamical relationships with chaos search, which can provide new learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Chaos Search in Fourier Amplitude Sensitivity Test by Koda, Masato

    Published 2012
    “…This paper explores the characterization of learning functions involved in FAST and derives the underlying dynamical relationships with chaos search, which can provide new learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Development of images segmentation using image thresholder and batch processing technique on the blood smears by Al-Shoukry, Suhad, Zalili, Musa, Amer, Duha, Kareem, Safaa Muhsen

    Published 2022
    “…Next, we clean up the obtained cell mask and examine cell properties using the image region analyzer function, which allows quickly filling in region holes and filtering out regions based on their properties such as area dimensions or eccentricity. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A Stepper Motor Design Optimization Using by Wong, Chin Wei

    Published 2005
    “…The production process, including material processing and winding, would take up too much time and expense. There is a need to fill this void in the area of small-motor design, and develop a program using Genetic Algorithms (GAs) as an approach to achieve optimization. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin by Hussin, Ain Amirah

    Published 2016
    “…The project achieve objectives by using RAD (Rapid Application Development) approach as the guideline and by making sure that this application is filled with great user experiences and functionality goals. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Characterization of dumping soil and settlement prediction using Monte Carlo approach by Mohd Pauzi, Nur Irfah

    Published 2013
    “…These models are soil mechanics based model, Bjarngard and Edgers model, Power Creep function, hyperbolic function and rheological function. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah by Mansoor Abdullah, Hayat

    Published 2012
    “…Then principal component analysis (PCA) was applied to normalize the extracted features.Novel techniques of auto-alignments with shape index procedures was developed here,where auto-alignments function was used to aligned image objects with horizontal coordinates to extracted object features in similar position. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A Wavelet-Based Approach For The Analytical Solutions Of Fractional Differential Equations And The Numerical Solutions Of Fractional Integral Equations by Loong, Marcus Ong Wei

    Published 2024
    “…To fill this gap, the present dissertation derives an analytical method based on this integral transform by applying it to the riemann-liouville integral and derivative, and the caputo derivative. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of electrical resistance tomography applying vertical metallic column by Suzanna, Ridzuan Aw, Ruzairi, Hj Abd Rahim, Yasmin, Abdul Wahab, Farah Hanan, Azimi, Lia Safiyah, Syafie, Raja Siti Nur Adiimah, Raja Aris

    Published 2021
    “…This paper focusing on the hardware and software development of laboratory test Electrical Resistance Tomography (ERT) measurement methods to obtain the cross-sectional image of the conductivity distribution of gas bubble phantom in a static vertical metallic column filled with water. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item