Search Results - (( java implementation rsa algorithm ) OR ( parameter intention model algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm by Li, Man, Liu, Fang, Abdullah, Zulhamri

    Published 2024
    “…First, this work uses one-dimensional convolutional neural network (1DCNN) to model the relationship between the two. This model uses multichannel convolution feature, BN and Dropout strategy to promote performance for the model. …”
    Get full text
    Get full text
    Article
  7. 7

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…Extreme value (EV) theory has raised researcher intention for modeling and forecasting of catastrophic or higher risk events. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. The post-islanding frequency stability is maintained by optimizing the Load Frequency Control‘s parameters. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…A parametric model based on Hill Muscle Model (HMM) to estimate the knee joint moment is developed for both experiments protocols. …”
    Get full text
    Get full text
    Thesis
  10. 10

    FACTORS INFLUENCING THE INTENTION TO ADOPT E-WALLET: A REGIONAL DISTRIBUTION PERSPECTIVE IN MALAYSIA by Liew, Vernon, Poh, Phaik See

    Published 2022
    “…Using a quantitative approach and purposive sampling technique, data collection is engineered to have a prerequisite of minimum 50 respondents per region. Based on parameters of two tailed test with confidence interval of 95% (significance level 0.05), a total of 400 responses were analysed via SmartPLS with PLS-SEM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article