Search Results - (( java implementation rsa algorithm ) OR ( basic using self algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Deterministic Automatic Test Pattern Generation for Built-In Self Test System by Mohammed Khalid, Muhammad Nazir

    Published 2006
    “…To illustrate that, the DATPG algorithm for digital combinational circuit using VHDL language is designed to generate the test patterns. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…Fractal geometry is looking for self-similarity, self-similarity resonance, and self-similarity convergence. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Disposable Biomimetic Array Sensor Strip Coupled With Chemometric Algorithm For Quality Assessment Of Orthosiphon Stamineus Benth Samples by Yap, Maxsim Mee Sim

    Published 2006
    “…A disposable screen printed array sensor strip based on self-plasticized methacrylate acrylate PVC blend lipid membranes combined with chemometric algorithm has been developed and applied for qualitative and quantitative analysis of O.stamineus samples. …”
    Get full text
    Get full text
    Thesis
  14. 14

    ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING by ABDUL RAHIM, NURALIAH

    Published 2020
    “…Hence, this paper contribute to justify by the basic concepts of data mining, described the selected types and models of algorithms, and the process of data mining by using R Tools.…”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Computer aided interactive pressure vessel design by Teoh, Sun Jie

    Published 2008
    “…Software Microsoft Visual Basic 6.0 is used for the purpose of building the interactive interfaces and processing the data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Transtheoretical model of change for weight control in Malaysian context by Chang, Ching Thon

    Published 2010
    “…The findings of this study indicated that the basic constructs of the TIM: the Stages of Change, the Decisional Balance, the Self-Efficacy, and the integration between the Stages of Change, and the Decisional Balance, Stages of Change and the SelfEfficacy variables were generalizable to the study population. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Determining Suitable Program For SPM Holder Using Neural Network Approach by Noraisah, Sudin

    Published 2002
    “…The basic architecture are multilayer feedforward networks, trained using the Backpropagation algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…In the third stage, implementation process is done by coding the motion detection software using Microsoft Visual Basic 6.0. The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model by Oh, Chai Lian

    Published 2017
    “…The form-finding procedure involves method of solving the system of equilibrium equations through the use of Moore-Penrose generalized inverse, determination of self-equilibrium stress modes via eigenvector basis decomposition and optimization of coefficients for the linear combination of linearly independent selfequilibrium stress modes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Earth observation micro-satellite design optimization using satellite simulator / Robertus Heru Triharjanto … [et al.] by Heru Triharjanto, Robertus

    Published 2016
    “…It is also find that due to full acces level, the self-made simulator as used in the research has good potential to be used in the optimization case with search algorithm.…”
    Get full text
    Get full text
    Get full text
    Article