Search Results - (( java implementation rsa algorithm ) OR ( based computing cell algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    BASE: a bacteria foraging algorithm for cell formation with sequence data by Nouri, Hossein, Tang, Sai Hong, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar

    Published 2010
    “…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhanced cell-based algorithm with dynamic radius in solving capacitated multi-source weber problem by Nurhazwani, Ahmad Razak

    Published 2021
    “…Random selection of facility location in a Cell-based approach may cause infeasible or worse solutions. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…Cells are formed based on presuming fixed single route and parts demand (traditional cell formation) or fluctuation of parts demand (dynamic cell formation). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Energy management strategies, control systems, and artificial intelligence-based algorithms development for hydrogen fuel cell-powered vehicles: A review by Oladosu T.L., Pasupuleti J., Kiong T.S., Koh S.P.J., Yusaf T.

    Published 2025
    “…EMS strategies; AI-based algorithms categories, functions and hybridization; the state-of-art and future direction of AI-based algorithms and HFCEVs? …”
    Review
  11. 11

    Computer-aided acute leukemia blast cells segmentation in peripheral blood images by Madhloom, H.T., Kareem, S.A., Ariffin, H.

    Published 2015
    “…The method also introduces an approach to split overlapping cells using the marker-controlled watershed algorithm based on a new marker selection scheme. …”
    Get full text
    Article
  12. 12
  13. 13

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  14. 14
  15. 15

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…In practice, most of studies apply a straightforward approach for evaluation where appropriate performance metrics such as classification accuracy is selected, computes the mean and its variance over several repetitive experiments, and then compares it with the base algorithm or other comparative approach. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar by Omar, Burhanuddin

    Published 1997
    “…In practice, only a very small number of passes are typicaUy needed. To deal with cells of various size , the algorithm progresses by moving one cell at a time between the blocks of the partition while maintaining a desired based on the size of the blocks rather than the number of cells per block. …”
    Get full text
    Get full text
    Thesis