Search Results - (( java implementation rsa algorithm ) OR ( causing process based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Distance vector-hop range-free location algorithm for wireless sensor network by Zazali, Azyyati Adiah

    Published 2015
    “…This has caused the tasks for each sensor node to be permanently fixed, thus causing the overall process of the localization algorithm to be complex. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…However, the population trapped in local optimality and premature convergence to cause in DE algorithm have cause poor performance during optimization process. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…The filter algorithm is based on an enhanced harmonic mean filter algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The link between Hazard and Operability Study result documentation with data base of process operation is important, in order to analyse the causes and consequences of the whole process deviation on fractionation column. …”
    Get full text
    Get full text
    Article
  10. 10

    Coarse Resolution Defect Localization Algorithm For An Automated Visual Pcb Inspection by Ibrahim, Zuwairie, Al-Attas, Syed Abdul Rahman, Aspar, Zulfakar

    Published 2002
    “…Printing process, which is done before the etching process, caused most of the destructive defects found on the PCB. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…This study is divided into several phases including preliminary study, experimental design, algorithm enhancement and result analysis. Initialization position of the particles is the first process in PSO and basically all particles are initialized at random position that may cause high computation risk. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A hybrid kidney algorithm strategy for combinatorial interaction testing problem by Ameen Ali, Mohammed Ba Homaid

    Published 2022
    “…In addition, the hybrid metaheuristic-based CIT strategies require more execution time than their own original algorithm-based strategies. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…In this study, a fully online density-based clustering algorithm called Buffer-based Online Clustering for Evolving Data Stream (BOCEDS) is presented. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fire Detection Algorithm using Image Processing Techniques by Poobalan, Kumarguru, Liew, Siau-Chuin

    Published 2015
    “…In this paper we proposed a fire detection algorithm based on image processing techniques which is compatible in surveillance devices like CCTV, wireless camera to UAVs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…As a result, these errors will produce less accurate results during the process of extraction to the original watermark. Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Analysis of anti-multipath performance based on traditional acquisition algorithm of boc signal by Ji, Yuanfa, Song, Sisi, Sun, Xiyan, Kamarul Hawari, Ghazali, Zhao, Songke

    Published 2022
    “…In order to analyze the degree of interference caused by multipath errors in the signal acquisition process, and compare the anti-multipath performance advantages of the acquisition algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks by Alagirisamy, Mukil, Chow, Chee Onn

    Published 2018
    “…In our algorithm, tentative cluster head is selected based on energy based timer, residual energy, node IDs and trust value. …”
    Get full text
    Get full text
    Article
  19. 19

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…In data-intensive workflows, heavy data moves across the execution nodes. This causes high communication overhead. To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Design of a flexible digital baseband signal processing algorithm by Mohamad, Rosalina, Harun, Harlisya, Nuzli, Mohamad Anas, Dimyati, Kaharudin

    Published 2006
    “…We also implement this algorithm on DSP TMS320C6711 from Texas Instruments and the result shown in this paper is based on CPU (Central Processing Unit) performance of DBSP functions that can be calculated using DSP-BIOS Instrumentation Module. …”
    Get full text
    Get full text
    Conference or Workshop Item