Search Results - (( java implementation rsa algorithm ) OR ( programming testing tools algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…Based on this, the research employ a linear regression technique in the AI penetration testing. This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The performance of the tool has been tested using 20 data sets of scenario CPS, created by the researcher. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…By leveraging AI and machine learning, the system dynamically suggests the most suitable penetration testing tools which are Nmap, XSStrike, PwnXSS, OWASP ZAP, or Burp Suite. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman by Mat Norman, Mohd Arif

    Published 2024
    “…Comparison with experimental results demonstrated errors of less than 5%. A paired t-test confirmed the significant improvement of the prediction tool compared to other laminated composite theories, with the t-test value exceeding the 95% confidence statistical t-value. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…Java program has been used to test the performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem by Ngo, T.S., Jaafar, J., Aziz, I.A., Aftab, M.U., Nguyen, H.G., Bui, N.A.

    Published 2022
    “…We evaluated the effectiveness of the proposed algorithm with the Tabu Search algorithm and the original genetic algorithm on the tested dataset. …”
    Get full text
    Get full text
    Article
  16. 16

    Software Classification Using Structure-Based Descriptors by Ramadan, Qusai Hussein

    Published 2009
    “…Based on the undertaken experiment, the IBK algorithm is noted to generate the highest classification accuracy (74.8%) compared to several other algorithms provided in the Weka tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor by Mat Ishor, Nur Ayuni Izlin

    Published 2019
    “…Movie recommendation is a software program known as tools that are used for providing a suggestion for movie consumers in making a decision on a movie to watch. …”
    Get full text
    Get full text
    Thesis
  18. 18

    EasyA: Easy and effective way to generate pairwise test data by Rabbi, Khandakar Fazley, Sabira, Khatun, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2013
    “…Java program has been used to test the performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article by Abdol Azis, Hazriq Syahmie

    Published 2010
    “…I used Newton Raphson for load flow algorithm and composed it with Genetic Algorithm. The suggested method is programmed under MATLAB software. …”
    Get full text
    Get full text
    Article
  20. 20