Search Results - (( java implementation rsa algorithm ) OR ( basic application model algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11
  12. 12
  13. 13
  14. 14

    Control of Omni-Directional Mecanum wheel mobile Robot and analysis of Artificial Muscle by Mohamedd Rizon, Mohamed Juhari, Prof Madya Dr., Jefri Efendi, Mohd Salih, Mohammad Hanif, Abdul Hamid

    Published 2009
    “…A four channel high power H-bridge using 2 units of LMD 18200 motor drivers IC circuit was design, built and interfaced to a BasicStamp (BS2) microcontroller board. Basic mobility algorithm using BasicStamp software was developed to test the basic mobility capabilities and test the qualitative view of the system's mobility performance. …”
    Get full text
    Article
  15. 15

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. Clustering technique basically utilizes distance measure to define distance between various data points. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In industrial applications, it is essential to have online recursive subspace algorithms for model identification where the parameters can vary in time. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20