Search Results - (( evolution implementation clustering algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…K-Means algorithm a popular efficient clustering techniques and genetic algorithm a widely used evolutionary algorithm and known for its adaptive nature were combined to determine the level of handwriting legibility for each child. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced image segmentation in thermal infrared image processing for faulty detection on broadcasting equipment / Mohd Rizman Sultan Mohd, Sukreen Hana Herman and Zaiton Sharif by Mohd, Mohd Rizman Sultan, Herman, Sukreen Hana, Sharif, Zaiton

    Published 2018
    “…The data gathered from the system will undergo enhanced image segmentation method using k-means clustering with the implementation of histogram equalization for further image processing algorithm to detect the presence of hot spot. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Species distribution and molecular variations in drogonflies (order: odonata) within the state of Selangor, Malaysia / Noorhidayah Binti Mamat by Noorhidayah, Mamat

    Published 2013
    “…Opposite to suborder Zygoptera, they were resolved clustered into 2 clusters, paraphyletic group. The distinct separation between cluster Anisoptera and Zygoptera with confidence level 72% in the NJ analyses while 90% in MP analyses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…In order to validate the competence of these proposed algorithms, results were compared with another similar research work known as DPRS algorithm. …”
    Get full text
    Get full text
    Thesis