Search Results - (( java implementation rsa algorithm ) OR ( problem solving delay algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Search algorithms for path planning problems in harsh wireless sensor network environment by Hong, Siaw Swin

    Published 2017
    “…Each algorithm solves its respective problem with Enhanced D* solving long initial delay in dynamic environment, NBN solves harsh conditions with limited computational power, and FWN optimized the result of TSP path planning problem with minimal computational effort. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Bezier curves based numerical solutions of delay systems with inverse time by Ghomanjani, Fateme., Farahi, Mohammad Hadi, Kilicman, Adem, Kamyad, Ali Vahidian, Pariz, Naser

    Published 2014
    “…The direct algorithm is given for solving this problem. The delay function and inverse time function are expanded by the Bézier curves. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8

    One-step block methods for solving ordinary and delay differential equations by Mohd Radzi, Hazwani

    Published 2011
    “…A new modified algorithm from the existing program for solving ODEs was developed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Solving delay differential equations (DDEs) using nakashima's 2 stages 4th order Pseudo-Runge-Kutta method by Ayunni Sarbi N.A., Bin Mamat M.B.

    Published 2013
    “…This paper is investigate numerically the problem on solving Delay Differential Equations (DDEs) using Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method and also developed the algorithm of Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method incorporates with Hermite Interpolation. …”
    Get full text
    Non-Indexed Article
  10. 10

    Multistep block methods for solving higher order delay differential equations by Hoo, Yann Seong

    Published 2016
    “…Numerical methods provide an alternative way of constructing solutions to the problems. This thesis describes the development of numerical algorithms for solving higher order DDEs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…This thesis investigates the numerical solutions for solving first order retarded and neutral delay differential equations and its analysis in block multistep methods. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…The combination metrics of the lifetime and the sequence number in the table entry is used to solve the problem of the discarded active path information when the lifetime is expired. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An iterative procedure for production-inventory-distribution routing problem by Dicky Lim, T.K., Moin, N.H.

    Published 2015
    “…In phase 2, we propose a variable neighborhood search procedure as the metaheuristics for solving the problem. Computational experiment is conducted to test the effectiveness of the algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system by Jasni, Jasronita

    Published 2010
    “…However, its effectiveness and efficiency are still in question 8S it needs many continuation steps to solve each problem. This situation will delay the process of corrector in the system. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Single-objective and multi-objective optimization algorithms based on sperm fertilization procedure / Hisham Ahmad Theeb Shehadeh by Hisham Ahmad, Theeb Shehadeh

    Published 2018
    “…In addition, the proposed MOSFP outperformed OMOPSO in solving problems such as WFG5, WFG8, and ZDT3. At the end, the proposed MOSFP has been used to solve a real-life problem such as optimizing a set of Quality of Services (QoS) objective functions (network models) in WSN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Design sensor-less PID filter controller for first order delays system by Ghiasi, Hootan, Piltan, Farzin, Avazpour, Mohammad Reza, Mazloom, Mohammad Hadi, Sahamijoo, Amirzubir, Sulaiman, Nasri B.

    Published 2016
    “…Assuming unstructured uncertainties and structure uncertainties can be defined into one term and considered as an uncertainty and external disturbance, the problem of computation burden and large number of parameters can be solved to some extent. …”
    Get full text
    Get full text
    Article
  20. 20