Search Results - (( java applications rsa algorithm ) OR ( basic evaluation study algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    High performance hierarchical torus network under matrix transpose traffic patterns by Rahman, M.M. Hafizur, Susumu, Horiguchi

    Published 2004
    “…In this paper, we present a deadlock-free routing algorithm for the HTN using virtual channels and evaluate the network’s dynamic communication performance under matrix transpose traffic, using the proposed routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Shortest Path Trajectory System Based on Dijkstra Algorithm by Putri, Indah Pratiwi

    Published 2012
    “…This study discussed the emphasis on the single source shortest path at the location of specific studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Group consumers' preference recommendation algorithm model for online apparel's colour based on Kansei engineering by Ge, Baoru, Shaari, Nazlina, Mohd Yunos, Mohd Yazid, Zainal Abidin, Sazrinee

    Published 2023
    “…That is, this study obtained consumers' aesthetic emotional preference for men's plain-colour shirts in China, colour design elements of shirts that are widely recognized and accepted, basic colour calculation scales, recommendation preferences algorithms and models for group consumers, and verified their effectiveness by PCA.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Ant system with heuristics for capacitated vehicle routing problem by Tan, Wen Fang

    Published 2013
    “…The ASH algorithm is basically applied with its probabilistic decision rule and pheromone feedback to construct the sequences of customers to be visited in the CVRP solution. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak by Rajogoval, Illayakantthan

    Published 2022
    “…Therefore, this study aims to identify and evaluate the attributes and parameters associated with the development of the Basic Reproduction Number, R0 models, classify the data used in existing Basic Reproduction Number R0 models, develop a predictive classification model for the Basic Reproduction Number, R0 and to assess and enhance the accuracy of the Basic Reproduction Number, R0 prediction. …”
    Get full text
    Get full text
    Monograph
  11. 11
  12. 12

    Dynamic communication performance of a hierarchical torus network under non-uniform traffic patterns by Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2004
    “…In this paper, we present a deadlock-free routing algorithm for the HTN using 3 virtual channels and evaluate the network's dynamic communication performance under three non-uniform traffic patterns, using the proposed routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Convergence Analysis of the African Buffalo Optimization Algorithm by Odili, Julius Beneoluchi, M. N. M., Kahar, Noraziah, Ahmad

    Published 2016
    “…The analysis of the convergence of Nature-inspired optimization algorithms is necessary to help researchers and practitioners understand the workings of the algorithms in the algorithms’ attempts at solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    A study on personalized recommender system using social media by Aishnivya, Balamurugan

    Published 2020
    “…These machine learning algorithm processes the data set obtained. The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…Overall, the study shows that the UHDS8 algorithm produces better results compared to the FUHS16 and UHDS16 algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems by Din, Fakhrud, Khalid, Shah, Fayaz, Muhammad, Gwak, Jeonghwan, Kamal Z., Zamli, Mashwani, Wali Khan

    Published 2022
    “…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
    Get full text
    Get full text
    Get full text
    Article