Search Results - (( java implementation rsa algorithm ) OR ( programming data connection algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus by Megat Yunus, Puteri Nor Ashikin

    Published 2023
    “…Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…In the proposed approaches, to overcome the mentioned issues in Mobile IP networks when a Mobile Node moves, parametric linear programming and graph theory are employed. To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat by Fatima, Jannat

    Published 2022
    “…This research work has used novice programming learners’ eye-tracking and Galvanic Skin Response (GSR) data in a novel approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Current applications of machine learning in dentistry by Ghazali, Ahmad Badruddin, Reduwan, Nor Hidayah, Ibrahim, Roliana

    Published 2022
    “…The quality of the output depends on the quality of data used to train and validate the algorithm (Rowe, 2019). …”
    Get full text
    Get full text
    Book Chapter
  10. 10

    Security mechanism for wireless Mobile Ad Hoc Networks (MANET) by Abdul Rahman Sidek, Diana

    Published 2006
    “…These algorithms are chosen because they are suitable for low bit rate data. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…A heuristic selection model was developed namely Evaluative AP Selection which used LINUX Bash script programming whilst the internet connection speed test was ran by means of PHP script. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Design And Development Of Gas Argon Purging System by Ooi, Seng Yeong

    Published 2006
    “…AMPL is used in two ways of connection of its programming, first is Data Base, and second is PC element. …”
    Get full text
    Get full text
    Monograph
  13. 13

    OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH by NUR AFIQAH, JAHILAN

    Published 2022
    “…PV technology comprises the grid-connected PV systems and off-grid PV systems. Off-grid PV systems generate and distribute electrical energy independently, unlike the grid-connected PV systems. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14
  15. 15
  16. 16

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. …”
    Get full text
    Get full text
    Thesis
  17. 17

    SOLID-STATE MP3 PLAYER by Abdul Rahman, Mohd Faizul Fatan

    Published 2005
    “…i. Data transfer to storage, ii. Data transfer from storage…”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Resource allocation techniques for downlink Non-Orthogonal Multiple Access-Based 5G wireless systems by Ali, Zuhura Juma

    Published 2021
    “…The expected usage growth of smart devices in the wireless cellular system and many connected devices with other new, improved technological advancement has resulted in the high data rate demands and spectrum scarcity problems. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20