Search Results - (( java implementation rsa algorithm ) OR ( parameter program new algorithm ))*

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…The second taxonomy is a new taxonomy proposed to classify the adaptive DE algorithms in particular into two categories (DE with adaptive parameters and DE with adaptive parameters and strategies) considering the adaptive components used in this algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.] by Ismail, Razidah, Ahmad, Tahir, Harish, Noor Ainy, A. Halim, Rosenah

    Published 2011
    “…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini by Saarini, Jumaliah

    Published 2006
    “…The way to solve this problem, we applied the existed method in visual C++ programming with used the Random midpoint Displacement (RMD) algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network by Khairi, Kharina

    Published 2003
    “…This algorithm paved the way for the generation of performance parameters through simulation of the new LAN. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    New completion time algorithms for sequence based scheduling in multiproduct batch processes using matrix by Shafeeq , A., M.I., Abdul Mutalib, Amminudin , K.A., Muhammad , A.

    Published 2008
    “…The current work proposes new completion time algorithms for multiproduct batch process with two commonly used transfer policies namely zero wait (ZW) and no intermediate storage (NIS). …”
    Get full text
    Get full text
    Article
  13. 13

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…The main advantage of this algorithm is that no algorithm-particular controlling parameters are required for this algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Continuation power flow for voltage stability assessment / Mohd Zamri Laton by Laton, Mohd Zamri

    Published 2006
    “…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Combinatorial Black Hole Algorithm: A Metaheuristic Approach for Combinatorial Testing by Ibrahim, Izrulfizal Saufihamizal, Ibrahim, Rosziati, Mat Rejab, Mazidah

    Published 2023
    “…In this paper, a new approach called the Combinatorial Black Hole Algorithm (CBHA) is presented for CT that combines the strengths of CT and BHA. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    1D Multigrid Solver For Finite Element Method by Azhar, Mohamad Amiruddin

    Published 2022
    “…The new algorithm also has been tested using time simulation. …”
    Get full text
    Get full text
    Monograph
  18. 18

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…The new components such as participation of time stamp, time action, and other parameters such as special priority are introduced. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Combinatorial Black Hole Algorithm: A Metaheuristic Approach for Combinatorial Testing by Ibrahim, Izrulfizal Saufihamizal, Ibrahim, Rosziati, Mat Rejab, Mazidah

    Published 2023
    “…In this paper, a new approach called the Combinatorial Black Hole Algorithm (CBHA) is presented for CT that combines the strengths of CT and BHA. …”
    Get full text
    Get full text
    Get full text
    Article