Search Results - (( java application rsa algorithm ) OR ( management implementation based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison for selection technique in genetic algorithm by Muhamad Azree, Mat Said

    Published 2006
    “…The purpose of this project is to make a comparison for three selection techniques in Genetic Algorithm.The Genetic Algorithm has been implemented in the previous module for Chess Tournament Management System.Base on previous system the selection method only using randomize.By this project module,only three selections method were use for the comparison.They are Roulette Wheel, Steady-State and Rank selection.The result for this comparison has determined the appropriate selection for Genetic Algorithm implementation in Chess Tournament Management System.This will help Chess Tournament Management System to provide a better optimize schedule.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Window based personalized time management system by Siew Ann, Lilian Tong

    Published 2012
    “…The time management system is being widely used to manage time effectively.This paper presents on how window-based personalized time management system will be developed according to user’s need.Besides that,this paper will discuss on two(2)types of searching algorithm which are Binary Search Tree (BST) and Hashing Algorithm.The algorithms were tested and the one with better performance in terms of speed was implemented in this project.Through this system, users could manage their time in a simple and effective manner.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software by Nik Yusoff, Nik Mohd Ramli, Mohd Shafri, Helmi Zulhaidi, Muniandy, Ratnasamy, Mohammad Wali, Islam

    Published 2014
    “…The shortest path routing is one of the well-known network analysis techniques implemented in road management systems. Pg Routing as an extension of Postgre SQL/Post GIS database is an open source library that implements the Dijkstra shortest path algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…The efficiency of the mobile robot increases by 77% compared to manually controlled robot. The behaviour based implementation on the mobile robot managed to find the shortest path with the rate of failure of less than 15%. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The second algorithm, named as Asynchronous Event-Driven algorithm is derived to manage heterogeneous subsystems in smart home environment. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…The purpose of this project is initially to present an implementation of a guidance algorithm based on the geometrical analysis for the adoption of path planning problem. …”
    Get full text
    Learning Object
  17. 17

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…Based on the research that had been conducted, it shows that the enhanced algorithm have managed to speed up the computational process for encryption and decryption of the text in the Android platform to reduce computational overhead. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…Conclusion: The proposed algorithm has enabled to derive an ideal balance between the complexity of intelligent processing and the versatility of managing the token ring.…”
    Get full text
    Get full text
    Article
  19. 19
  20. 20