Search Results - (( java implementation rsa algorithm ) OR ( basic interaction make algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri by Muhamad Shukri, Muhamad Nur Adhwa

    Published 2017
    “…The technique used to recognize human emotions is an AdaBoost algorithm as classifier. The usability test are conducted on students in UiTM(T) Kuala Terengganu to make sure the application is meet requirement. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    The development of virtual product life cycle design tool using artificial intelligence technique by Harun, Habibollah, Ismail @ Ishak, Hasrul Haidar, Sukimin, Zuraini

    Published 2008
    “…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
    Get full text
    Monograph
  10. 10

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…In one-side incomplete information problem, comparison between MGT algorithm and smart random trade-offs (SRT) algorithm indicates that MGT outperforms SRT. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Kodepoly: an engaging approach to blended futuristic learning in coding by Abd Rahman, Norsyafrina, Azhar Amanullah, Ayn Nur Azhana

    Published 2024
    “…This project introduces Kodepoly, a board game prototype inspired by Monopoly, designed to teach basic coding principles in a fun and interactive way. …”
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Position-based QoS multicast routing protocol for mobile Ad Hoc Networks by Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Qabajeh, Mohammad M., Qabajeh, Liana K.

    Published 2010
    “…For group-oriented multimedia applications Quality of Service (QoS) provision is a basic requirement, which makes an efficient QoS multicast routing protocol a very important issue. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    AUTO-MANAGE PARKING SYSTEM (AMPS) by KHAIRUDDIN, MUHAMMAD AMIRUL SYAFIQ

    Published 2019
    “…For functionality, the system only able to serve its basic function and it still need few improvements. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Instance matching framework for heterogeneous semantic web content over linked data environment by Mansir, Abubakar

    Published 2021
    “…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A study on ambulance response time in Kuala Lumpur, Malaysia by Sujak, Ahmad Fadzil

    Published 2008
    “…The call taker would interact with the caller to gather critical medical information through an algorithmic set of questions as depicted in Emergency dispatch form and would manually filled up the form. …”
    Get full text
    Get full text
    Thesis