Search Results - (( java application rsa algorithm ) OR ( based rational method algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Rational Bi-Quartic Spline with Six Parameters for Surface Interpolation with Application in Image Enlargement by Karim, S.A.A.

    Published 2020
    “…Thus, the new rational bi-quartic spline with six parameters is better than the existing scheme via an efficient algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    Rational methods for solving first order ordinary differential equation by Fairuz, A'in Nazifa

    Published 2019
    “…The formulation of the methods are based on two distinct rational functions that are proposed in thesis, where the first class of methods are derived based on rational function with denominator of degree one, as the degree of the numerator increases. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Ranking trapezoidal fuzzy numbers based on set theoretic indices with Hurwicz criterion / Nazirah Ramli by Ramli, Nazirah

    Published 2003
    “…This study investigates on the development of the NRI and based on that, two observations and three algorithms are created. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Inversion algorithm of fiber bragg grating for nanofluid flooding monitoring by Yahya, N., Nyuk, C.M., Ismail, A.F., Hussain, N., Rostami, A., Ismail, A., Ganeson, M., Ali, A.M.

    Published 2020
    “…This technique is a promising method in rational magnetophoresis toward fluid mobility via fiber Bragg grating (FBG). …”
    Get full text
    Get full text
    Article
  14. 14

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…To address these challenges, this research introduces a novel Depth Linear Discrimination-Oriented Feature Selection Method based on Adaptive Sine Cosine Algorithm, named Depth Adaptive Sine Cosine Feature Selection (DASC-FS). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…In contrast with traditionally used free running oscillators, it uses a novel method of random noise extraction based on two rationally related synthesized clock signals. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Composite slab numerical strength test method under partial connection approach by Mohammed, Kachalla, Abd. Karim, Izian, Abd. Aziz, Farah Nora Aznieta

    Published 2017
    “…This study seeks to address this challenge by developing and a subsequent experimental validation of a numerical strength determination function for PCS through implementing a rational-based approach. Hence, a procedural algorithm lead to the development of PCS determination function using longitudinal shear estimation method by considering section slenderness and deck characteristics. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Face detection of thermal images based on color image processing by Nur Farahana , Mat Khairi

    Published 2012
    “…It focuses on thermal image based method which implemented with MATLAB software. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Transmission lines modelling based on RLC passive and active filter design by Turki, Ahmed Qasim, Mailah, Nashiren Farzilah, Sabry, Ahmad H.

    Published 2017
    “…This research proposes a new method for modelling the transmission line based on a rational approximation function which can be extracted through the Vector Fitting (VF) method, based on the frequency response measured data points. …”
    Get full text
    Get full text
    Get full text
    Article