Search Results - (( java implementation rsa algorithm ) OR ( ((using function) OR (using factor)) using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    A-star (A*) algorithm implementation for robotics path planning navigation by Emirul Ridzwan, Nor Azmi

    Published 2018
    “…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm by Rosmazi, Rosli, Zamri, Mohamed

    Published 2021
    “…The newly proposed algorithm was tested using a set of standard benchmark functions with different searching space and global optima placement. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…This stochastic learning method is a useful addition to the existing methods for determining the center and smoothing factors of radial basis function neural networks, and it can also help the network more efficiently train. …”
    Get full text
    Get full text
    Article
  10. 10

    Performance comparison of LFXLMS, MOVFXLMS and THF-NLFXLMS algorithms for Hammerstein NANC by Srazhidinov, Radik, Raja Ahmad, Raja Mohd Kamil

    Published 2016
    “…When using optimum leakage factors, these algorithms show close performance with benchmark nonlinear FXLMS (NLFXLMS) algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network by Bujal, Noor Ropidah

    Published 2022
    “…As for multi-objective functions associated with the optimisation problem, a weight-sum method is typically used to determine each objective function's coefficient factors (CF). …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  13. 13

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  14. 14

    Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm by Nik Mohamed Hazli, Nik Muhammad Aiman

    Published 2018
    “…In this research, swarming intelligence is used to solve optimisation problem. Grey Wolf Optimizer and Dragonfly Algorithm were chosen. …”
    Get full text
    Get full text
    Monograph
  15. 15

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    New heuristic function in ant colony system for job scheduling in grid computing by Ku-Mahamud, Ku Ruhana, Alobaedy, Mustafa Muwafak

    Published 2012
    “…Job scheduling is one of the main factors affecting grid computing performance. Job scheduling problem classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Ant colony system algorithm is a meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This paper focuses on enhancing the heuristic function where information about recent ants’ discoveries will be taken into account.Experiments were conducted using a simulator with dynamic environment features to mimic the grid environment.Results show that the proposed enhanced algorithm produce better output in term of utilization and make span.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    New Complexity Weights for Function Point Analysis Using Artificial Neural Networks by Mohammed Abdullah, Hasan Al-Hagri

    Published 2004
    “…The last step is determining 14 technical complexity factors. Although, function points are widely used, they still have limitations. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm by Mohd Annuar, Khalil Azha, Selamat, Nur Asmiza, Jaafar, Hazriq Izzuan, Mohamad, Syahrul Hisham

    Published 2013
    “…The cost function used in this paper is based on the Kruppa’s equation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai

    Published 2022
    “…The SHA-256 hash function factor four hardware implementation was successfully tested using the Altera DE2-115 FPGA board. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article