Search Results - (( java implementation rsa algorithm ) OR ( program quality connection algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…A heuristic selection model was developed namely Evaluative AP Selection which used LINUX Bash script programming whilst the internet connection speed test was ran by means of PHP script. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Current applications of machine learning in dentistry by Ghazali, Ahmad Badruddin, Reduwan, Nor Hidayah, Ibrahim, Roliana

    Published 2022
    “…The process is similar to a human expert that can learn by repeated training (Hung et al., 2019). The quality of the output depends on the quality of data used to train and validate the algorithm (Rowe, 2019). …”
    Get full text
    Get full text
    Book Chapter
  9. 9
  10. 10
  11. 11
  12. 12

    Development Of An Intelligent Water Blending System For Irrigation Of Crops With Various Salinity Tolerance And Aquaculture by Abdullah Al-Jughaiman, Abdullah Sulaiman

    Published 2008
    “…In a typical arid agricultural area, there will be abundant low quality ground water and little quantities of good quality water. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Convertible active power filter: A new approach to compensate for current quality problems in the DS by Mohammed, B.S., Ibrahim, R.B.

    Published 2015
    “…This paper presents a new moveable power quality (PQ) conditioner named convertible active power filter (CAPF) which aims to compensate for current quality (CQ) problems in the industrial, commercial or residential areas. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Helperconnect / Leviana Andrew ... [et al.] by Andrew, Leviana, Mat Yusof, Marlita, Wan Ibrahim, Wan Muhd Faez, Hassan, Siti Salwa, Haris, Nurfazlina

    Published 2024
    “…Our marketing strategies include digital campaigns, partnerships with advocacy groups, and referral programs. The service offers a commission-based fee structure for sustainability, combining essential errand running with genuine companionship to enhance users' overall quality of life. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad by Mahamad, Laina Sofia

    Published 2017
    “…These videos are captured based on busy hour time and non busy hour with differences of wired and wireless for six user's connections. Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimal forwarding routing protocol in ipv6-based wireless sensor network by Jamil, Ansar

    Published 2009
    “…In WSNs, TinyOS is the most widely used operating system. Thus, programming code of the OF routing protocol algorithm is written using NesC language, which is a high level programming language that emulates the syntax and functionality of hardware description languages, and provides components for communication, thread coordination, and hardware abstraction. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Factors predicting health practitioners' awareness of UNHS program in Malaysian non-public hospitals by Ismail, Abdussalaam Iyanda, Abdul Majid, Abdul Halim, Zakaria, Mohd Normani, Abdullah, Nor Azimah Chew, Hamzah, Sulaiman, Mukari, Siti Zamratol-Mai Sarah

    Published 2018
    “…In addition, non-significant relationship between screening techniques and healthcare practitioners' awareness of UNHS program is connected with the fact that the techniques that are practiced among public and non-public hospital are similar and standardized. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis