Search Results - (( java implementation rsa algorithm ) OR ( parameter extraction protocol algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio... by Tan, Ru Yi

    Published 2018
    “…Biometric data, feeding and fluid regimens, vital signs and laboratory parameters (haematological, metabolic and biochemical results) were extracted and collected from the patient�s hospital ICU records. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Assessing the efficacy of machine learning algorithms for syncope classification: A systematic review by Goh, Choon-Hian, Ferdowsi, Mahbuba, Gan, Ming Hong, Kwan, Ban-How, Lim, Wei Yin, Tee, Yee Kai, Rosli, Roshaslina, Tan, Maw Pin *

    Published 2024
    “…Extracted data encompassed subject count, age range, syncope protocols, ML type, hemodynamic parameters, and performance metrics. …”
    Get full text
    Get full text
    Article
  8. 8

    Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV) by Mustaffa Kamal Basha, Abdul Aziz

    Published 2016
    “…The extracted and controlled parameters are engine RPM, vehicle speed and vehicle fuel consumption. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Various network topologies are simulated in order to investigate the effects of implementing this program on a network for various network performance parameters. The results are stored in trace files. Tracegraph201 is used to generate plots, from which data is extracted and then plotted again using Excel for comparison purposes. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…The time cost of each component in the security state is extracted as parameters to compute the perceived and predicted values of the security situation of the proposed model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Automatic impulse response for experimental modal analysis on running harmonics condition / A. Jannifar by A. , Jannifar

    Published 2018
    “…Experimental Modal Analysis (EMA) is a well-known technique used to extract the dynamic characteristics (resonance related parameters) of structure under non-operational condition. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Physical fatigue prediction based on heart rate variability (HRV) features in time and frequency domains using artificial neural networks model during exercise by Zulkifli, Ahmad@Manap, Mohd Najeb, Jamaludin, Ummu Kulthum, Jamaludin

    Published 2019
    “…A new signal of HRV was used to analyze by extracting the features in each level of fatigue based on Edward’s Method zones. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item