Search Results - (( java implementation rsa algorithm ) OR ( program effectiveness during algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…Using the dynamic programming algorithm developed, the model was also able to recalculate alternative schedules by replacing unavailable teams with other teams to avoid delays. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Differential equation fault location algorithm with harmonic effects in power system by Izatti, Md Amin, Mohd Rafi, Adzman, Haziah, Abdul Hamid, Muhd Hafizi, Idris, Melaty, Amirruddin, Omar, Aliman

    Published 2023
    “…The network model is simulated using the alternate transients program (ATP)Draw simulation program. Several fault scenarios have been implemented during the simulation, such as fault resistance, fault distance, and fault inception angle. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults by Zakari, Abubakar, Lee, Sai Peck, Targio Hashem, Ibrahim Abaker

    Published 2019
    “…During program testing, software programs may be discovered to contain multiple faults. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…The re-execution of all test cases during the regression testing is costly. And even though several of the code based addresses procedural programs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…The re-execution of all test cases during regression testing will be costly. The effective and efficient test case selection from the existing test suite becomes very critical issue in regression testing. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Effect of viscous dampers on yielding mechanisms of RC structures during earthquake by Hejazi, Farzad, Shoaei, Mohammad Dalili, Jaafar, Mohd Saleh

    Published 2015
    “…A special finite element computer program was codified based on the developed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Some metaheuristic algorithms for solving multiple cross-functional team selection problems by Ngo, S.T., Jaafar, J., Izzatdin, A.A., Tong, G.T., Bui, A.N.

    Published 2022
    “…We introduced a method that combines a compromise programming (CP) approach and metaheuristic algorithms, including the genetic algorithm (GA) and ant colony optimization (ACO), to solve the proposed optimization problem. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Effective software fault localization based on complex network theory / Abubakar Zakari by Abubakar , Zakari

    Published 2019
    “…FLCN-S shows significant improvement in terms of localization effectiveness on single-fault programs in comparison with Ochiai based and Jaccard-based techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Quality checking and inspection based on machine vision technique to determine tolerancevalue using single ceramic cup by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Wong, Gao Jie, Bahar, Mohd Bazli, Sulaiman, Marizan, Mat Ibrahim, Masrullizam, Zainal Abidin, Amar Faiz

    Published 2017
    “…It is also designed to track specific colour of product and conduct the inspection process. Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Quality checking and inspection based on machine vision technique to determine tolerance value using single ceramic cup by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Wong, Gao Jie, Bahar, Mohd Bazli, Sulaiman , Marizan, Mat Ibrahim, Masrullizam, Zainal Abidin, Amar Faiz

    Published 2016
    “…It is also designed to track specific color of product and conduct the inspection process. Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
    Get full text
    Get full text
    Get full text
    Article