Search Results - (( java implementation rsa algorithm ) OR ( patterns using cloud algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Genetic algorithm optimized network in cloud data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2016
    “…This could be considered a combinatorial problem, which in our methodology is attempted to be solved using genetic algorithm. The generated network card configurations adapt to the typical characteristics of cloud network traffic pattern. …”
    Get full text
    Get full text
    Article
  7. 7

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The use of evaluators in the PECSCO mechanism to pre-assess data prior to synchronization with cloud storage has been shown to substantially decrease cloud expenses. …”
    Conference paper
  8. 8

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…Experiments were conducted using CloudSim and real HPC workload traces of Metacentrum HPC Workload. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Feature Extraction and Matching from images / lntan Syaherra Ramli by Ramli, lntan Syaherra

    Published 2023
    “…The 30 point cloud used to represent the real object.…”
    Get full text
    Get full text
    Monograph
  10. 10
  11. 11

    Enhanced replication strategy with balanced quorum technique and data center selection method in cloud environment by Mohd Ali, Fazlina

    Published 2022
    “…Thorough experiments were conducted using the ‘CloudSim’ simulation tool. The dataset generated by CloudSim was in random structured master files in various sizes. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Particle track finding using hough transform in a central drift chamber detector / Khasmidatul Akma Mohamed Kamal Azmi by Khasmidatul Akma , Mohamed Kamal Azmi

    Published 2022
    “…The method of the Hough Transform became an iconic method to trace and identify the pattern of the charged track in the HEP based on the evaluation of the track finding in the cloud chamber experiment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…So, this thesis experiments to ascertain the optimal surveying patterns and sensing parameters required to accurately sense methane gas clouds with minimal selfinduced air disturbance. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Land Use Changes in Jeli, Kelantan by Muhammad Firdaus Abdul Karim

    Published 2013
    “…Land use change pattern can be obtained via spatial analysis using Geographical Information System (GIS) and acquiring satellite imagery in remote sensing. …”
    Get full text
    Undergraduate Final Project Report
  17. 17

    Android: S-Based Technique in Mobile Malware Detection by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Ali, Al Fahim Mubarak, Muhammed Ramiza, Ramli

    Published 2018
    “…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Deep convolutional neural networks for forensic age estimation: A review by Alkaabi S., Yussof S., Al-Khateeb H., Ahmadi-Assalemi G., Epiphaniou G.

    Published 2023
    “…The article also aims to evaluate various databases and algorithms used for age estimation using facial images and dental images. � 2020, Springer Nature Switzerland AG.…”
    Book Chapter
  19. 19

    Proposed conceptual Iot-based patient monitoring sensor for predicting and controlling dengue by Hassan N.H., Salwana E., Drus S.M., Maarop N., Samy G.N., Ahmad N.A.

    Published 2023
    “…Therefore, this paper provides a recent review of the latest methods and algorithms used to design wearable sensor for patient monitoring in dengue outbreak. …”
    Article
  20. 20