Search Results - (( evolution information system algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Quality-driven scheduling for long-term evolution system by Mohd. Ramli, Huda Adibah, Sandrasegaran, Kumbesan, Patachaianand, Rachod

    Published 2011
    “…This paper proposes a novel packet scheduling algorithm that extends Opportunistic and Delay Sensitive (ODS) algorithm to simultaneously support Guaranteed Bit Rate (GBR) and Non-GBR (NGBR) services over downlink Long Term Evolution (LTE) system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    An interactively recurrent functional neural fuzzy network with fuzzy differential evolution and its applications by Cheng, Jian Lin, Chih, Feng Wu, Hsueh, Yi Lin, Cheng, Yi Yu

    Published 2015
    “…The traditional differential evolution (DE) method easily gets trapped in a local optimum during the learning process, but the proposed fuzzy differential evolution algorithm can overcome this shortcoming. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Evaluation of Search Result of Document Search Based GA (DSEGA) by Kamal Norfarid, Kamaruddin

    Published 2004
    “…It is composed by a series of module that using information retrieval method and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Delay-Prioritized Scheduling (DPS) for Real Time Traffic in 3GPP LTE System by Sandrasegaran, Kumbesan, Mohd. Ramli, Huda Adibah, Basukala, Riyaj

    Published 2010
    “…This has imposed new challenges in the design of packet scheduling algorithms in these systems. To address those challenges, a new packet scheduling algorithm for real time (RT) traffic in downlink third generation partnership project long term evolution (3GPP LTE) system is proposed in this paper. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20

    Performance analysis on automated and average channel quality information (CQI) reporting algorithm in LTE-A by Mohd. Ramli, Huda Adibah, Ahamad Sukor, Masturah

    Published 2016
    “…Robust service can be achieved in error prone Long Term Evolution-Advanced (LTE-A) by dealing with imperfect Channel Quality Information (CQI). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper