Search Results - (( java implementation rsa algorithm ) OR ( changes extraction path algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm by Mohd Yusof, Muhammad Syafiq, Toha @ Tohara, Siti Fauziah

    Published 2019
    “…The ACO been chosen because of the positive feedback for rapid discovery and able to use in dynamic applications for example adapts to changes like new distances. The performance of the algorithm showed that the execution time of ACO is more realistic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Oil Palm Yield Data Collection Using Image Processing by Yee, Rachel Jee San

    Published 2021
    “…This area involves techniques such as path finding and stabilising in order to control the drone. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    WiFi-based human activity recognition through wall using deep learning by Wong, Yan Chiew, Ahmed Abuhoureyah, Fahd Saad, Mohd Isira, Ahmad Sadhiqin

    Published 2023
    “…The current focus of using WiFi Channel State Information (CSI) for human activity recognition (HAR) is the line-ofsight (LoS) path, which is mainly affected by human activities and is very sensitive to environmental changes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article