Search Results - (( java application rsa algorithm ) OR ( system implementation case algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    PID control system implementation in embedded system for DC motor speed control by Ariff, Che Mohd Noor

    Published 2008
    “…PID algorithm that has been implemented in MCU inside the DC motor controller module system can eliminate the steady state error and overshoot problem including settling time. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…Within the GA, nearest neighbor algorithm is used in determining the most similar recorded case that can be used in solving the new case. …”
    Conference paper
  8. 8

    A novel N-input voting algorithm for X-by-wire fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ramli, Abdul Rahman

    Published 2014
    “…Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementation of case-based reasoning in help desk system by Tee, Shih Min

    Published 2019
    “…Besides of time consuming when solving customers’ problem, the personnel also faced inherently knowledge problem during help desk operation and difficulty in assessing abundant case data without a systematic system. The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11
  12. 12

    Indoor navigation system using Dijkstra's algorithm for emergency situation / Mohd Faizulhayad Mashuri by Mashuri, Mohd Faizulhayad

    Published 2015
    “…This research discuss on an implementation of route planning in Indoor Navigation System (INS) for emergency situation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Investigation of binary search algorithm as maximum power point tracking technique in Solar PV System by Meng, Chung Tiong, Hamdan, Daniyal, Mohd Herwan, Sulaiman, Mohd Shafie, Bakar

    Published 2018
    “…In order to examine the performance of both algorithms, five different constant irradiance test cases and four rapid changing irradiance test cases were imposed to the PV system to examine the capability of the both algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…Multi-objective function is the summation of three indices that are considered in these algorithms, i.e. real power loss index (PLI), reactive power loss index (QLI), and cumulative voltage index (CVD), and implemented on an IEEE 30-bus test system. …”
    Get full text
    Get full text
    Thesis
  18. 18

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Real-time based implementation of MUD systems has the potential to play a major role in next-generation communication systems.…”
    Get full text
    Get full text
    Article
  19. 19

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…There are a lot of success stories about its implementation but rapid changes in manufacturing systems may cause a CMS not to perform well in every case. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Construction of prioritized t-way test suite using Bi-objective Dragonfly Algorithm by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli

    Published 2022
    “…We have designed and implemented a Bi-objective Dragonfly Algorithm (BDA) for prioritized t-way test suite generation, and the two objectives are test case weight and test case priority. …”
    Get full text
    Get full text
    Get full text
    Article