Search Results - (( java application rsa algorithm ) OR ( waste reduction based algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Efficiency of heuristic algorithms in solving waste collection vehicle routing problem: a case study by Mat, Nur Azriati, Benjamin, Aida Mauziah, Abdul-Rahman, Syariza

    Published 2018
    “…This paper investigated the efficiency of six heuristic algorithms from prior studies in the attempt to solve issues related to waste collection, namely: (i) Nearest Greedy (NG), (ii) Further from Depot (FFD), (iii) Different Initial Customer (DIC), (iv) Savings Approach, (v) Sweep Algorithm, and (vi) Different Initial Customer based on Sweep Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficiency of heuristic algorithms in solving waste collection vehicle routing problem: a case study by Mat, Nur Azriati, Benjamin, Aida Mauziah, Abdul-Rahman, Syariza

    Published 2018
    “…This paper investigated the efficiency of six heuristic algorithms from prior studies in the attempt to solve issues related to waste collection, namely: (i) Nearest Greedy (NG), (ii) Further from Depot (FFD), (iii) Different Initial Customer (DIC), (iv) Savings Approach, (v) Sweep Algorithm, and (vi) Different Initial Customer based on Sweep Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A greedy heuristics multiple criteria model for solving multi-landfill site selection and plant propagation algorithm for improving waste collection vehicle routing solutions by Nur Azriati, Mat

    Published 2023
    “…The results revealed that a single landfill site (Candidate 4) was the best solution for the case-based scenario, with a 6.74% reduction in total distance travelled. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The effect of government policy on the relationship between organizational factors and construction waste management in Abuja, Nigeria by Nasidi, Yusuf

    Published 2016
    “…Drawing upon the resource base view theory, this study aimed to examine the effects of government policy on the relationship between organizational factors and construction waste management. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Incorporating energy generation process in environmental assessment of a biopharmaceutical process by Auni Hamimi, Idris

    Published 2015
    “…Therefore, this work aims to estimate the PET value from WFT and pure steam generation using a simple algorithm which is modified from Waste Reduction (WAR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks by Muftah, Shalghum Khaled

    Published 2022
    “…In the third part, the worst-case AVB latency under overlapping-based TT windows (AVB-OBTTW) algorithm is presented to examine the OFWOS effects on AVBlatency performance, where represents an AVB queue, i.e., { }. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18