Search Results - (( java implementation rsa algorithm ) OR ( basic computer flow algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming by Abdul Rahim, Ruzairi, Mohd. Nayan, Norkharziana, Fazalul Rahiman, Mohd. Hafiz

    Published 2006
    “…Real-time simulation of ultrasonic tomography system applied to liquid and gas flow has been implemented by previous researcher using Visual Basic 6.0 software programming. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Evaluation of various estimation equations for particle-fluid interaction forces and modeling of heat transfer between particles for dem simulations by Azri, Alias

    Published 2013
    “…The numerical simulations methods for two-phase flow are basically divided into three kinds of methods, which are the Two-Fluid Model (TFM), the Discrete Element Method (DEM) and Computational Fluid Dynamics (CFD) coupling model that is simply called as the DEM, and the Direct Numerical Simulation (DNS). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of ultrasonic tomography for composition determination of water and oil flow by Ng, Wei Nyap

    Published 2005
    “…The cross-sectional-image is reconstructed by a custom-created software using Microsoft Visual Basic 6.0. The image reconstruction algorithm that used in the software is linear back projection (LBP) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    One-dimension high-order compact method for solving euler's equation by Mohamad, Mahmod Abd Hakim bin

    Published 2010
    “…In the field of computational fluid dynamics, many numerical algorithms have been developed to simulate inviscid, compressible flows problems. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fingerprint reconstruction based on improved directional image by Othman, Mohamad Kharulli

    Published 2005
    “…This thesis presents a fingerprint image reconstruction algorithm using Directional Fourier filtering. Prior to the image reconstruction, a directional image is first computed using Mehtre technique and followed by a 3-tier enhancement processes viz. …”
    Get full text
    Get full text
    Thesis