Search Results - (( java implementation rsa algorithm ) OR ( knowledge using replication algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Managing Fragmented Database Using BVAGQ-AR Replication Model by Ainul Azila, Che Fauzi, Noraziah, Ahmad, Tutut, Herawan, Z., Abdullah, Gupta, Ritu

    Published 2017
    “…Problem arises when the database is packed with data, but it has lacked of knowledge. If the unreasonable data is used in database replication, it will cause waste of data storage and delay the time taken for a replication process. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model by Noraziah, Ahmad, Wan Maseri, Wan Mohd, Ainul Azila, Che Fauzi

    Published 2015
    “…The problem is although we are packed with data, but we have lacked of knowledge. Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    BVAGQ-AR for Fragmented Database Replication Management by N., Ahmad, Ainul Azila, Che Fauzi, Sharifah Hafizah, Sy Ahmad Ubaidillah, Al-Kazemi, Basem, Odili, Julius Beneoluchi

    Published 2021
    “…Although we have been packed with data, we still have lacked of knowledge. Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Binary vote assignment on grid quorum replication technique with association rule by Ainul Azila, Che Fauzi

    Published 2018
    “…First step is mining the data by using Apriori algorithm from Association Rules. It is used to discover the correlation between data. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A framework for automatic modelling of survival using fuzzy inference. by Hamdan, Hazlina, Garibaldi, Jonathan M.

    Published 2012
    “…After the initialisation of the fuzzy inference structure, the replication data (until time to event) will be subject to be trained using the gradient descent and nonnegative least square algorithm to estimate the conditional event probability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Signal to noise ratio as a guideline to obtain valid auditory brainstem response results by Dzulkarnain, Ahmad Aidil Arafat

    Published 2020
    “…Typically, the technique uses to identify a true ABR is by using response replication analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    GLCM correlation approach for blood vessel identification in thermal image by Rusli, Nazreen, Md Yusof, Hazlina, Sidek, Shahrul Na'im, Ishak, Nor Izzati

    Published 2019
    “…However, to the best of our knowledge, there is no research done to detect emotion of autistic children by using thermal camera. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17