Search Results - (( java application rsa algorithm ) OR ( using practical use algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…The experimental tests of the proposed algorithm have shown that the reduction percentage in the MSE output using the proposed algorithm is 51% compared to the NLMS algorithm and 61% compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Disparity between theory & practice beyond the worst-case competitive analysis by Iqbal, Javeria, Ahmad, Iftikhar, Shah, Asadullah

    Published 2019
    “…Online algorithms are used in a variety of situations such as forex trading, cache replacement, and job scheduling etc. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    A practical method for the analysis of genetic algorithms by Alshaikhli, Imad Fakhri Taha

    Published 2011
    “…The experimental result done on some of the known genetic algorithms show the usefulness of the proposed method in improving the quality of genetic algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems by Kek, Sie Long

    Published 2011
    “…Furthermore, the accuracy of the state estimate with the smallest state error covariance is enhanced by using the Kalman filtering theory. This enhancement produces the filtering solution by using the second sub-algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Student-supervisor matching using stable marriage algorithm / Siti Farahana Nodzari by Nodzari, Siti Farahana

    Published 2007
    “…Therefore, the main objective of this project is to develop a system that is able to match student to the supervisor using Stable Marriage Algorithm. Students who do not know lecturers area and which lecturer is suitable for their project can use this system in order to find lecturer's in the same area using this matching system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…Consequently, the practical applicability of the NLFXLMS algorithm is limited by this drawback. …”
    Get full text
    Get full text
    Thesis
  17. 17

    AntNet: a robust routing algorithm for data networks by Haseeb, Shariq, Sidek, Khairul Azami, Ismail, Ahmad Faris, Weng Kin, Lai, Yit Mei, Aw

    Published 2004
    “…Successful implementation and operation of a network largely depends on the routing algorithm in use. To date, several routing algorithms are in use but the problem with these algorithms is that they are either not adaptive or not robust enough, thus limiting the proper use of bandwidth. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Modelling and Optimization of Asymmetric Vehicle Routing Problem Using Particle Swarm Optimization Algorithm by Muhamad Rozikin, Kamaluddin, M. F. F., Ab Rashid

    Published 2021
    “…The computational experiment was conducted using five test problems with different sizes. The optimization results indicated that this algorithm able to offer good solutions with the best answer for the practical problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    CSC669 - Cryptographic Algorithms / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics and Media

    Published 2021
    “…The subject delivery combines both theoretical and practical aspects of cryptography algorithms…”
    Get full text
    Get full text
    Get full text
    Teaching Resource