Search Results - (( java implementation rsa algorithm ) OR ( program turning process algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…An Intelligent Learning System for the turning process was developed. Visual C++ object-oriented programming language was used to build the Intelligent Learning System for Turning. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Teaching and learning via chatbots with immersive and machine learning capabilities by Nantha Kumar Subramaniam

    Published 2019
    “…Chatbot is a computer program that simulates human conversation through voice commands or text chats or both. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Integrated Clonal Accelerated Mutation Evolutionary Programming for Composite Compensation in Power System by Ismail S.A., Musirin I., Mansor M.H., Hamid Z.A., Jelani S., Kumar A.V.S.

    Published 2025
    “…Thus, a compensation process can be performed to alleviate the high current flow which in turn reduces the monetary losses that can be experienced by the utility. …”
    Conference paper
  11. 11

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…The results for the selection were evaluated respectively to see the variation in selection pattern when compared to the default selection algorithm. The time interval during the scanning and selection process was also analysed in the investigation to further identify the performance of the model. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Hardware Acceleration of Window Big-Digit (Wbd) Multiplication for Embedded Applications by Lim, Ee Wah

    Published 2015
    “…Hence, wBD number system could be an excellent candidate to speed up overall multiplication process. The wBD algorithm has been analyzed and benchmarked against other multiplication methods in algorithmic level. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Selective exposure in the digital age: a systematic review of the mechanisms, contexts, and sociopsychology implications for media ecosystems(2013-2023) by Chi, Jinglin, Kamarudin, Syafila

    Published 2025
    “…This study shows the relevance of selective exposure research for the understanding of media behaviors, cognitive processes, and sociopolitical dynamics for future research as well its implications as sensitive to media literacy programs and policy interventions. …”
    Get full text
    Get full text
    Get full text
    Article