Search Results - (( exploring service function algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function by Tan, Min Keng

    Published 2019
    “…The idea is proposed in effort of accessing the functionality of the proposed algorithm to improve the smoothness of traffic flow in a network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive resource allocation algorithms with QoS support in OFDMA-based WiMAX networks by Alsahag, Ali Mohamemed Mansor

    Published 2014
    “…Two-Tier EDRR provides better performance than the conventional algorithms in terms of end-to-end delay, throughput, and delay jitter for Unsolicited Grant Service (UGS), enhanced real time Polling Service (ertPS), rtPS, non-real time Polling Service (nrtPS) and BE services. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Explore Ease by Rahman, Mohammad Miskatur

    Published 2024
    “…In addition, "Explore Ease" provides a wide range of services that are catered to the different interests of tourists, such as adventure activities, cultural excursions, and local food experiences. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…The evaluation will cover the product, services provided, delivery service and experience. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno by Karno, Md Razib

    Published 2015
    “…(c) To study how constructed patterns and trends generate informed decisions on resource allocation for circulation function by using cluster analysis, frequency statistics, averages and aggregates and market basket analysis algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Determining gender differential item functioning for mathematics in coeducational school culture by Shanmugam, S. Kanageswari Suppiah

    Published 2018
    “…The novelty of this study is that gender Differential Item Functioning was studied in the context of school culture, which is notable for successful mathematics learning.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…A fair schedule is necessary since it determines the quality of service as well as staff or customer satisfaction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Multi-objective scheduling of MapReduce jobs in big data processing by Hashem, Ibrahim Abaker Targio, Anuar, Nor Badrul, Marjani, Mohsen, Gani, Abdullah, Sangaiah, Arun Kumar, Sakariyah, Adewole Kayode

    Published 2018
    “…The model consists of two objective functions, namely, (i) completion time and (ii) cost minimization. …”
    Get full text
    Get full text
    Article
  20. 20

    Remotely sensed imagery data application in mangrove forest: a review by Abdul Whab @ Abdul Wahab, Zulfa, Kamarudin, Norizah

    Published 2018
    “…The mangrove forest ecosystem acts as a shield against the destructive tidal waves, preventing the coastal areas and other properties nearby from severe damages; this protective function certainly deserves attention from researchers to undertake further investigation and exploration. …”
    Get full text
    Get full text
    Get full text
    Article