Search Results - (( java implementation rsa algorithm ) OR ( causing problem based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Enhanced cell-based algorithm with dynamic radius in solving capacitated multi-source weber problem by Nurhazwani, Ahmad Razak

    Published 2021
    “…Random selection of facility location in a Cell-based approach may cause infeasible or worse solutions. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…This problem can cause the imbalance in sales. Based on the problem statement, Genetic Algorithm was applied to test whether it is compatible to predict the future sales. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Various Artificial Intelligent (AI) algorithms can be applied in solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks by Alagirisamy, Mukil, Chow, Chee Onn

    Published 2018
    “…In our algorithm, tentative cluster head is selected based on energy based timer, residual energy, node IDs and trust value. …”
    Get full text
    Get full text
    Article
  14. 14

    A hybrid kidney algorithm strategy for combinatorial interaction testing problem by Ameen Ali, Mohammed Ba Homaid

    Published 2022
    “…In addition, the hybrid metaheuristic-based CIT strategies require more execution time than their own original algorithm-based strategies. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Exponential-Based Spiral Dynamic Algorithm for Modelling of a Flexible Manipulator System by Ahmad Nor Kasruddin, Nasir, Raja Mohd Taufika, Raja Ismail, Mohd Ashraf, Ahmad

    Published 2015
    “…This paper presents an exponential-based spiral dynamic algorithm (SDA) as an improved version of the original SDA. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Bitwise-based Routing Algorithms in Optical Multistage Interconnection Network by Abed, Farzaneh

    Published 2007
    “…In the first, the Improved Zero algorithm is proposed to solve the problem and secondly, the Bitwise Improved Zero algorithm is developed. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…Based on the performance analysis, LR algorithm enhances the performance of the overhead, packet delivery ratio and packet loss ratio. …”
    Get full text
    Get full text
    Thesis
  20. 20