Search Results - (( java implementation rsa algorithm ) OR ( program based ((data algorithm) OR (path algorithm)) ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Vision-based robot indoor navigation by Teo, Zhin Hang

    Published 2022
    “…A different algorithm is created in the microcontroller to derive and perform the data delivered from the computer. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Mohammed, M.A

    Published 2021
    “…In this paper, a new optimized generation of CNC systems, based on combining the Open Architecture Control (OAC) technology supported by the G-code data model and the optimization algorithm are presented…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Study of climate change effects on rain height for satellite microwave links by Yong, Xin Yu

    Published 2024
    “…This can provide accurate data for future design work of satellite-based communication systems.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    New optimization feature for the developed open cnc controller based on ISO 6983 and ISO 14649 by Obayes, Noor Hatem

    Published 2021
    “…A new optimized system was developed based on open architecture control (OAC) technology and interpreted STEP-NC (Standard for the Exchange of Product Model Data) programming approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan by Nauman , Khan

    Published 2024
    “…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Performance comparison of MVDR and LCMV beamforming algorithm in 2.3 GHz adaptive antenna system by Salem B., Tiong S.K., Koh S.P., Hock G.C.

    Published 2023
    “…The blind beamforming technique is employed in the broadband wireless mobile systems to enhance the cellular systems in the aspect of capacity, data rates, null steering and coverage. This paper presents two methods of beamforming algorithm; Minimum Variance Distortionless Response (MVDR) and Linear Constraint Minimum Variance (LCMV). …”
    Article
  19. 19
  20. 20

    Enhancing programming language learning with 3D game-based programming for MSU students: codadventure / Abdullah Adib Aditia Wirawan and Nur Suhana Mohd Redzo by Aditia Wirawan, Abdullah Adib, Mohd Redzo, Nur Suhana

    Published 2024
    “…This study focuses on innovative approaches to enhance the learning experiences of programming languages, focusing on developing 3D game-based programming for students at Management & Science University (MSU). …”
    Get full text
    Get full text
    Conference or Workshop Item