Search Results - (( java implementation rsa algorithm ) OR ( program samples based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Sampling-based online motion planning for mobile robots: utilization of Tabu search and adaptive neuro-fuzzy inference system by Khaksar W., Hong T.S., Sahari K.S.M., Khaksar M., Torresen J.

    Published 2023
    “…Adaptive control systems; Controllers; Fuzzy neural networks; Fuzzy systems; Motion planning; Robot programming; Robots; Tabu search; Adaptive neuro fuzzy inference systems (ANFIS); Adaptive neuro-fuzzy inference system; ANFIS; Fuzzy controllers; Motion planning algorithms; Sampling-based algorithms; Sampling-based motion planning; Unknown environments; Fuzzy inference…”
    Article
  7. 7

    Quality checking and inspection based on machine vision technique to determine tolerancevalue using single ceramic cup by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Wong, Gao Jie, Bahar, Mohd Bazli, Sulaiman, Marizan, Mat Ibrahim, Masrullizam, Zainal Abidin, Amar Faiz

    Published 2017
    “…It is also designed to track specific colour of product and conduct the inspection process. Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Quality checking and inspection based on machine vision technique to determine tolerance value using single ceramic cup by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Wong, Gao Jie, Bahar, Mohd Bazli, Sulaiman , Marizan, Mat Ibrahim, Masrullizam, Zainal Abidin, Amar Faiz

    Published 2016
    “…It is also designed to track specific color of product and conduct the inspection process. Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…And even though several of the code based addresses procedural programs. Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Implementing frequency translation by adapting digital phase shifter for WCDMA using XILINX: article by Zakaria, Mohd Khalili

    Published 2009
    “…In order to make sure the data is shifted accordingly, it can be seen by simulating the written program of its testbench by mapping the entire written block diagram based on the algorithm itself. …”
    Get full text
    Get full text
    Article
  11. 11

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…The heuristic-based predictor provides a platform to utilize the heuristic power of human along with the algorithmic power, geometry accuracy of motion-planning programs and biomechanical laws of human. …”
    Get full text
    Get full text
    Thesis
  12. 12

    The impact of virtual reality on programming algorithm courses on student learning outcomes by Dewi, Ika Parma, Ambiyar, Effendi, Hansi, Giatman, Muhammad, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…This study aims to determine the impact of VR compared to traditional learning in improving student learning outcomes on programming algorithm materials. The method applied was a quasi-experimental design through pretest and posttest. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Implementation frequency translation by adapting digital phase shifter for WCDMA using XILINX by Zakaria, Mohd Khalili

    Published 2009
    “…In order to make sure the data is shifted accordingly, it can be seen by simulating the written program of its testbench by mapping the entire written block diagram based on the algorithm itself. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance comparison of linear and non-linear great deluge algorithms in solving university course timetabling problems by Joe Henry Obit, Yik Junn Kuan, Rayner Alfred

    Published 2017
    “…This research does not focus on hard constraints involved as the initial solution is solved based on Constraint Programming algorithm. The GD algorithm is tested over three benchmark datasets: testing dataset; semester 2 session 2014/2015 test set; semester 1 session 2015/2016 test set. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Predicting uniaxial compressive strength using Support Vector Machine algorithm by Zakaria, Hafedz, Abdullah, Rini Asnida, Ismail, Amelia Ritahani, Amin, Mohd For

    Published 2019
    “…More robust prediction can be established with bigger sample number. It is worth mentioning, that the program module that has been set up could be used repeatedly for other correlation problems.…”
    Get full text
    Get full text
    Article
  19. 19

    A DSP-based regular sampled pulsewidth modulation (PWM) technique for a multilevel inverter by Ahmad Azli, Naziha, Bakar, Mohd. Shafie

    Published 2004
    “…The other type involves hand-coding (writing of a C program) with algorithms designed to generate PWM signals using the DS1102 controller board. …”
    Get full text
    Get full text
    Book Section
  20. 20

    Decision tree method for fault causes classification based on RMS-DWT analysis in 275 kV transmission lines network by Asman, Saidatul Habsah, Ab Aziz, Nur Fadilah, Ungku Amirulddin Al Amin, Ungku Anisa, Ab Kadir, Mohd Zainal Abidin

    Published 2021
    “…The proposed method was carried out in the MATLAB/SIMULINK programming platform based upon the information made with the fault analysis of the 275 kV sample transmission line considering wide variations in the operating conditions. …”
    Get full text
    Get full text
    Article