Search Results - (( java implementation rsa algorithm ) OR ( based computing knowing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    How are exponents used in real-world situations? / Nurul Aityqah Yaacob by Yaacob, Nurul Aityqah

    Published 2023
    “…You also need to understand the logic behind algorithms and the order of the number system. Students typically multiply the base by the exponent, for instance, while computing the numerical value of an exponential equation. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…On the other hand, agent-based model offers a good method to solve complex computational problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SVD-based signal detector for cognitive radio networks by Omar, Mohd. Hasbullah, Hassan, Suhaidi, Amphawan, Angela, Awang Nor, Shahrudin

    Published 2011
    “…This paper examines the implementation of the Singular Value Decomposition (SVD) method to detect the presence of wireless signal.The method is used to find the maximum and minimum eigenvalues.We simulated the algorithm using common digital signal in wireless communication namely rectangular pulse shape, raised cosine and root-raised cosine to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in sensing signal without knowing the properties of the transmitted signal.The execution time is acceptable compared to the favorable energy detection.The computational complexity of SVD-based detector is medium compared to the energy detector.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A quick gbest guided artificial bee colony algorithm for stock market prices prediction by Shah, Habib, Tairan, Nasser, Garg, Harish, Ghazali, Rozaida

    Published 2018
    “…In this respect, in the present manuscript, we propose an algorithm based on ABC to minimize the error in the trend and actual values by using the hybrid technique based on neural network and artificial intelligence. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20