Search Results - (( java implementation rsa algorithm ) OR ( basic implementation from algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of an autonomous mobile robot navigation algorithm using C language by Subra Mullisi, Shafeq Marwan

    Published 2009
    “…This report basically discusses the study and also work that has been done from previous of the chosen topic, which is Implementation of an Autonomous Mobile Robot Navigation Algorithm using 'C' language. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of UPFC model into fast decoupled load flow by Mokhlis, Hazlie, Nor, K.M.

    Published 2004
    “…The model is integrated through sequential approach, where equations for solving these devices are separated from the basic Fast Decoupled equations. By using this approach, the basic Fast decoupled algorithm can be added with functionality to analyze UPFC without the need to modify the whole algorithm, which will require minimum modification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Accelerating graph algorithms with priority queue processor by Heng Sun, Ch'ng, Eik Wee, Chew, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…Many graph algorithms are organized as simple elaborations of basic graph searching algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…This project used iterative method to investigate the security algorithm and implemented the algorithm. Besides that, iterative methods also used to improve the frequency, power and are requirements performance of RIPEMD-160 hash function. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…Indexer" to decide and index the relevant web pages, and ''Search algorithm" to retrieve the data from the results of indexing. …”
    Get full text
    Get full text
    Thesis
  12. 12

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance study of adaptive filtering algorithms for noise cancellation of ECG signal by Islam S.Z., Islam S.Z., Jidin R., Ali M.A.M.

    Published 2023
    “…In this paper, the four types of AC and DC noises have been implemented according to their basic properties. After that, these noises have been mixed with ECG signal and nullify these noises using the LMS and the RLS algorithms. …”
    Conference paper
  15. 15

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Control of Omni-Directional Mecanum wheel mobile Robot and analysis of Artificial Muscle by Mohamedd Rizon, Mohamed Juhari, Prof Madya Dr., Jefri Efendi, Mohd Salih, Mohammad Hanif, Abdul Hamid

    Published 2009
    “…A four channel high power H-bridge using 2 units of LMD 18200 motor drivers IC circuit was design, built and interfaced to a BasicStamp (BS2) microcontroller board. Basic mobility algorithm using BasicStamp software was developed to test the basic mobility capabilities and test the qualitative view of the system's mobility performance. …”
    Get full text
    Article
  17. 17

    Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman by Osman, Mohamad Shaiful

    Published 2010
    “…This thesis searches the basic concepts and uses of the classical method Petri net algorithm in SCADA system to control and monitoring the process plant. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementing Kempe chain neighborhood structure in harmony search for solving curriculum based course timetabling by Wahid, Juliana, Mohd Hussin, Naimah

    Published 2013
    “…An essential aspect that contributes to the success of meta-heuristic algorithm over a curriculum-based course timetabling problem is determined by the neighborhood structure used.The basic neighborhood structures such as move and swap between lectures has no method for escaping from local minima or optimum that restricts the improvement of current solutions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Three-probe reflectometer algorithm for calculation of complex reflection coefficient of liquids / Aidil Saifan Abu Bakar by Abu Bakar, Aidil Saifan

    Published 2003
    “…This paper describes a technique for measurement of complex reflection coefficient of liquids using slotted line (implemented in waveguide form). In order to make precision measurement of magnitude and phase of reflection coefficient, the Three-Probe Reflectometer Algorithm has been used (which was implemented on the personal computer using Visual Basic 6 programming). …”
    Get full text
    Get full text
    Thesis