Search Results - (( java implementation rsa algorithm ) OR ( programming problem gaining algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A DC motor controller using PID algorithm implementation on PIC by Wan Robaah, W Ahmad

    Published 2008
    “…A simulation using MATLAB software is implemented to tune PID algorithm by changing the value of Proportional gain, Kp, Integral gain, Ki and Derivative gain, Kd to get a speed of the motor which is less overshoot and increase settling time. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…There are three main programs work together. The programs are back-propagation neural network program, training and performance program and recognition program. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…Thus, in this thesis, a new Smart Energy Meter (SEM) with adaptive data transfer algorithm is designed to accommodate the problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An efficacious multi-objective fuzzy linear programming approach for optimal power flow considering distributed generation by Warid Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2016
    “…An efficacious multi-objective fuzzy linear programming optimization (MFLP) algorithm is proposed to solve the aforementioned problem with and without considering the distributed generation (DG) effect. …”
    Get full text
    Get full text
    Article
  11. 11

    Building customer churn prediction models in Indonesian telecommunication company using decision tree algorithm by Ramadhanti,, Darin, Larasati, Aisyah, Muid, Abdul, Mohamad, Effendi

    Published 2023
    “…The best decision tree model has parameters of criterion information gain with a minimal gain = 0.01 and a max depth = 6. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A flowchart-based multi-agent system for assisting novice programmers with problem solving activities by Hooshyar D., Ahmad R.B., Raj R.G., Nizam M.H.N.M., Yousefi M., Horng S.-J., Rugelj J.

    Published 2023
    “…The aim is to improve students' problem solving skills and to introduce them to the basic programming algorithms prior to surface structure, using an automatic text-to-flowchart conversion approach. …”
    Article
  13. 13

    Coordination of PSS and PID controller for power system stability enhancement - overview by Kasilingam G., Pasupuleti J.

    Published 2023
    “…This paper broadly reviews the optimization methods and algorithms such as Conventional methods, Soft Computing, Genetic Algorithm (GA), Evolutionary Programming (EP), Differential Evolution (DE) and Swarm Intelligence methods were available for tuning the PID gains and PSS parameters successfully. …”
    Article
  14. 14
  15. 15
  16. 16

    A framework for GPU-accelerated AES-XTS encryption in mobile devices by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam

    Published 2011
    “…Recently, GPUs have presented higher performance for parallel programming than conventional CPUs while they continue gaining reduced cost. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Design and implementation of an optimal fuzzy logic controller using genetic algorithm by Khan, Sheroz, Abdulazeez, Salami Femi, Adetunji, Lawal Wahab, Alam, A. H. M. Zahirul, Salami, Momoh Jimoh Emiyoka, Hameed, Shihab A., Hassan Abdalla Hashim, Aisha, Islam, Mohd Rafiqul

    Published 2008
    “…Simulated results were verified by programming the PIC16F877A microcontroller with the algorithm and using it on a temperature control system where a fan was regulated in response to variations in the ambient system temperature. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Web page design for electronic commerce / Lee Fong Wai by Lee , Fong Wai

    Published 2003
    “…The sixth part covers the system implementation that involved the transformation of modules and algorithm into implementable commands by using the specified programming languages. …”
    Get full text
    Get full text
    Thesis