Search Results - (( development program connection algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Besides DEA, Evolutionary Programming (EP), Firefly Algorithm (FA) and Cuckoo Search Algorithm (CS) were also incorporated in the sizing algorithm for performance comparison. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus by Megat Yunus, Puteri Nor Ashikin

    Published 2023
    “…Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.] by Ismail, Razidah, Ahmad, Tahir, Harish, Noor Ainy, A. Halim, Rosenah

    Published 2011
    “…The initial phase involved the development of the FSSM of the superheater system. In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
    Get full text
    Get full text
    Research Reports
  13. 13

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…A heuristic selection model was developed namely Evaluative AP Selection which used LINUX Bash script programming whilst the internet connection speed test was ran by means of PHP script. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimizing kindergarten schedule using : graph coloring / Nur Nabilah Salleh Muner by Salleh Muner, Nur Nabilah

    Published 2019
    “…The greedy algorithm was used to color the graph and it was supported by the C++ program. …”
    Get full text
    Get full text
    Research Reports
  15. 15
  16. 16

    Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset by Chiang, Yi Fan

    Published 2017
    “…The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Development of adaptive perturb and observe-fuzzy control maximum power point tracking for photovoltaic boost dc-dc converter by Mohd Zainuri, Muhammad Ammirrul Atiqi, Mohd Radzi, Mohd Amran, Che Soh, Azura, Abd Rahim, Nasrudin

    Published 2014
    “…For evaluation and comparison analysis, conventional P&O and fuzzy logic control algorithms have been developed too. All the algorithms were simulated in MATLAB-Simulink, respectively, together with PV module of Kyocera KD210GH-2PU connected to PV boost dc-dc converter. …”
    Get full text
    Get full text
    Article
  18. 18

    Design And Development Of Gas Argon Purging System by Ooi, Seng Yeong

    Published 2006
    “…AMPL is used in two ways of connection of its programming, first is Data Base, and second is PC element. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman by Othman, Zulkifli

    Published 2021
    “…Subsequently, the CI-based sizing algorithm, known as Evolutionary-Dolphin Echolocation Programming Sizing Algorithm (EDEPSA) is formulated to determine the optimal models of each system component such that either Performance Ratio (PR) or Levelized Cost of Electricity (LCOE) of the system is optimized. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Structural assessment of a proposed precast wall connection under combined loading by Vaghei, Ramin

    Published 2016
    “…For this purpose, constitutive law and mathematical model for the IBS members, including: walls and connections are formulated and finite element algorithm is developed. …”
    Get full text
    Get full text
    Thesis