Search Results - (( java implementation rsa algorithm ) OR ( basic implementation during algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    CHAOS BASED BLOCK ENCRYPTOR by SARIN, FARHANA

    Published 2008
    “…In this project we will propose encryption algorithm which offer less computational complexity and also provide securing data not only during transmission but also during storage. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
    Get full text
    Learning Object
  8. 8

    Optimization-based method for estimating the transmission rate of COVID-19 during the lockdown in Malaysia by Alsayed, Abdallah, Aqel, Mohammad O. A., Kamil, Raja, Sadir, Hayder, Abuzaiter, Alaa, Alezabi, Kamal Ali, Sari, Hasan

    Published 2022
    “…During the Conditional MCO and Recovery MCO, the basic reproduction number was slightly decreased to an average R0 value less than 1. …”
    Get full text
    Get full text
    Article
  9. 9

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…The technique utilizes the narrow phase approach in detecting collision detection of non-convex object by testing collision between basic primitive and polygon. This algorithm is implemented in a virtual flexible manufacturing cell for the loading and unloading process performed by the robot. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    OPTIMIZATION-BASED METHOD FOR ESTIMATING THE TRANSMISSION RATE OF COVID-19 DURING THE LOCKDOWN IN MALAYSIA by Alsayed A., Aqel M.O.A., Kamil R., Sadir H., Abuzaiter A., Alezabi K.A., Sari H.

    Published 2023
    “…During the Conditional MCO and Recovery MCO, the basic reproduction number was slightly decreased to an average R0 value less than 1. …”
    Article
  12. 12
  13. 13

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Mobile Robot with Navigation Control and Communication by Mohammad Yatim, Amirah Izzati

    Published 2016
    “…The robot is designed to implement the project in the study of autonomous navigation and path planning. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…There are many advantages when the apparel industry implemented image processing during sorting the garments product to obtain the accurate quantity in the production line. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17

    Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim by Hashim, Hazwani

    Published 2014
    “…The improvised GDAis able to reduce computer running time as compared to previous algorithm and able to deals with a sparse graph. Implementation of the algorithm to graphical FACS model of CFB shows that it is able to better explained the combustion process in terms of depletion species over time t and important species which denotes as by-product of the combustion is shown to be in accordance to the real process. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran by Kalyani , Bahskaran

    Published 2021
    “…Subsequently, a computer algorithm and interfacing tool is developed. The tool enables any personal with basic computer literacy and access to the tool and data file to process the data and asses the HKP of the flight at ease. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…During the implementation testing, the functionality and usability of the website assurance application have been verified by different level of computing expert users. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…This block cipher uses only basic operations, key dependent S-box and XOR IS together so that it can be efficiently implemented on various platforms. …”
    Get full text
    Get full text
    Thesis