Search Results - (( java implementation rsa algorithm ) OR ( basic realization _ algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An introduction to swarming robotics: application development trends by Zainal Abidin, Zulkifli

    Published 2013
    “…It is very trying for a new researcher to understand the whole concept of swarming robotics (SR) and optimization algorithm (i.e. realizing the idea from animal's perception to the SR application). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Improving PID controller of motor shaft angular position by using genetic algorithm by Muhamad, Arif Abidin

    Published 2015
    “…This paper explores the well established methodologies of the literature to realize the workability and applicability of Genetic Algorithms for process control applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…To realize these objectives, the research in this thesis follows three basic stages, succeeded by extensive evaluations.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    UiTM Transportation Unit bus trip scheduling system / Noorzawanah Ab Rahim by Ab Rahim, Noorzawanah

    Published 2009
    “…Scheduling is committing resources to the realization of an event at a defined time, also committing resources to a plan. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modeling and Simulation of Active Attitude Control for Satellites by Ouhocine, Cherif

    Published 2004
    “…The mathematical model of the new system is developed and simulation about the roll and yaw axes are realized. A consequent amelioration in the satellite response can be observed…”
    Get full text
    Get full text
    Thesis
  16. 16

    Human Spontaneous Emotion Detection System by Radin Monawir, Radin Puteri Hazimah

    Published 2018
    “…Having smart computerized system which can understand and instantly gives appropriate response to human is the utmost motive in human and computer interaction (HCI) field.It is argued either HCI is considered advance if human could not have natural and comfortable interaction like human to human interaction.Besides,despite of several studies regarding emotion detection system, current system mostly tested in laboratory environment and using mimic emotion.Realizing the current system research lack of real life or genuine emotion input,this research work comes up with the idea of developing a system that able to recognize human emotion through facial expression.Therefore,the aims of this study are threefold which are to enhance the algorithm to detect spontaneous emotion,to develop spontaneous facial expression database and to verify the algorithm performance.This project used Matlab programming language,specifically Viola Jones method for features tracking and extraction,then pattern matching for emotion classification purpose.Mouth feature is used as main features to identify the emotion of the expression.For verification purpose,the mimic and spontaneous database which are obtained from internet,open source database or novel (own) developed databases are used.Basically,the performance of the system is indicated by emotion detection rate and average execution time.At the end of this study,it is found that this system is suitable for recognizing spontaneous facial expression (63.28%) compared to posed facial expression (51.46%).The verification even better for positive emotion with 71.02% detection rate compared to 48.09% for negative emotion detection rate.Finally,overall detection rate of 61.20% is considered good since this system can execute result within 3s and use spontaneous input data which known as highly susceptible to noise.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementation of MRAC, SVMPC and PID control based on direct digital control application for dc servomotor by Mohamad Saleh, Saleha

    Published 2005
    “…The desired behavior of the adaptive controller is expressed by utilizing reference model, and the algorithms have been realized using the Lyapunov method and MIT rules. …”
    Get full text
    Get full text
    Thesis
  19. 19

    The enhanced fault-tolerant AODV routing protocol for Wireless Sensor Network by Che-Aron, Zamree, Mohammed Al-Khateeb, Wajdi Fawzi, Anwar, Farhat

    Published 2010
    “…We design and implement a backup route algorithm by creating a backup path for every node in the network. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    A Review on the Development of Indonesian Sign Language Recognition System by Jasni, Mohamad Zain, Sutarman, na, Mazlina, Abdul Majid

    Published 2013
    “…Sign language recognition is needed for realizing a human oriented interactive system that can perform an interaction like normal communication. …”
    Get full text
    Get full text
    Get full text
    Article