Search Results - (( java application rsa algorithm ) OR ( program program top algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of a software for simulating active force control schemes of a two-link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…On Top Of That, The Graphical Results Can Be Observed And Analysed On-Line While The Program Is Running. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mixed convection in an inclined lid-driven square cavity with sinusoidal heating on top lid by A. Bakar, N., Roslan, R., Ali, M., Karimipour, A.

    Published 2017
    “…The top lid is heated sinusoidally while the bottom wall is maintained at cold temperature. …”
    Get full text
    Get full text
    Article
  10. 10

    Detection of Microcalcification Using Mammograms by Md Hasan, Khairul Nisak

    Published 2004
    “…The morphological operation was a simple and suitablemethod in identifying the microcalcification. The top-hat algorithm method that is a morphological operation was developed using MATLAB and successfully obtained the output image that shows the candidate microcalcification. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Development of a software for simulating active force control schemes of a two–link planar manipulator by Mailah, Musa, Poh, Yang Liang

    Published 2005
    “…On top of that, the graphical results can be observed and analysed on–line while the program is running. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Peer to Peer Video Streaming Application by Shafri, Muhammad llham Faez

    Published 2008
    “…The program will be done using Java enviromnent and its algorithms. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15

    The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop by Kerdprasop, Nittaya, Kerdprasop, Kittisak

    Published 2014
    “…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin by Shamsudin, Muhamad

    Published 2001
    “…The list is ordered, with the best match appearing at the top of the Web page.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20