Search Results - (( java implementation rsa algorithm ) OR ( program selection towards algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- program selection »
- selection towards »
- towards algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Towards a better feature subset selection approach
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
8
-
9
Performance and evaluation of soft handover system towards WCDMA in 3G network / Norlia Ghazali
Published 2004“…This report analyzes the performance of a soft handover algorithm that is the unique features towards WCDMA. …”
Get full text
Get full text
Thesis -
10
Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization
Published 2022“…Firstly, using MATLAB program, the ANN model is developed based on optimized topology and is then furthered optimized by genetic algorithm (GA) and particle swarm optimization (PSO) using MINITAB program. …”
Get full text
Get full text
Thesis -
11
The Effect of Entry Qualifications and Gender Towards Student Performance
Published 2009“…This paper presents the influence of gender, entry qualification and entry results towards the student performance in university. 65 students were randomly selected in Faculty of mechanical engineering, University Malaysia Pahang. …”
Get full text
Get full text
Conference or Workshop Item -
12
Differential evolution for neural networks learning enhancement
Published 2008“…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
Get full text
Get full text
Get full text
Thesis -
13
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…There was a clear confirmation that the novel application of the PLS-PA and BN to KAP on dengue study has shown improved results and reduces vagueness of intensifying KAP regarding dengue programs in some selected areas in Selangor, Malaysia. …”
Get full text
Get full text
Thesis -
14
Linear programming approach for scheduling sports league problems in Malaysia
Published 2017“…We get a greater number of total travelling distances when we select different predefined venues which are at remote places. …”
Get full text
Get full text
Get full text
Thesis -
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli
Published 2018“…The reference position of the robot hand however was programmed based on predetermined motor positions of the joints for grasping two different shapes of object. …”
Get full text
Get full text
Thesis -
18
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…Once the substrate has been removed, the component distortion comparison is examined by means of modified substrate removal algorithm where the error percentage of the models ranges from 2.96% until 8.05%. …”
Get full text
Get full text
Thesis
