Search Results - (( java implementation rsa algorithm ) OR ( program reporting practices algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    An alternative method to solve combined economic emission dispatch problems using flower pollination algorithm by Hong, Mee Song

    Published 2016
    “…CEED actually is a multi-objective problem and need complex programming to solve it. The problem becomes complicated when there is practical constraints to be considered as well. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin by Husin, Hapida

    Published 2008
    “…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…The research employs Extreme Programming (XP) methodologies to ensure high-quality code, agility, and collaborative development. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Development of an integrated scheduling model for handling equipment in automated port container terminals by Sadeghian, Syed Hamidreza

    Published 2014
    “…As the integrated scheduling of handling equipment is a “non-deterministic polynomialtime hard” (NP-hard) problem and also the computation time and ease of application are so important for real practices of the scheduling methods, So a meta-heuristic algorithm based on Genetic Algorithm is developed, in which, new operators create solutions considering the constraints of the problem and also a heuristic rule proposed which assigns the ALVs to the tasks. …”
    Get full text
    Get full text
    Thesis