Search Results - (( java implementation rsa algorithm ) OR ( quality function drops algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2024
    “…The proposed algorithm, named Intelligent Water Drops with Simulated Annealing (IWDSA), combines two powerful optimization methods: Intelligent Water Drops (IWD) and Simulated Annealing (SA). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
    Get full text
    Get full text
    Article
  9. 9

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. Policing process drops traffic while shaping process delay traffic to the next time transmissions. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Performance evaluation of corner effect in UMTS / Nurzaliza Ghazali by Ghazali, Nurzaliza

    Published 2009
    “…Parameter of Ee/No (dB) is considered to evaluate the quality of services of the system. Meanwhile, parameter RSCP is used to measure the percentage of signal dropped. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…A few comparative results in downlink have shown that our integrated support vector regression assists genetic algorithm (SVRaGA) is capable of predicting next interval power consumption at Node B with low prediction error and improving the quality of service (QoS) by reducing dropped calls. � 2008 IEICE.…”
    Conference Paper
  12. 12

    Quality of service performances of three mobile ad hoc network protocols by Adam, Nabilah

    Published 2009
    “…The thesis proposed to evaluate the Quality of Service (QoS) performances of three types MANET protocols. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction by Hui, Ng Suk

    Published 2024
    “…The images were reconstructed using the OSEM (16 subsets, 3 iterations) and Q.Clear algorithms, both of which include Point Spread Function (PSF) modelling. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…Despite this, the fractal encoder’s popularity with the partition iterated function system rapidly drops due to its long encoding period. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Simulation of multiple mobile robots using JMonkey Engine by Tang, Shuen Cherng

    Published 2016
    “…On the other hand, the subpart for this project is to design a virtual slider gripper with a function of gripping objects and travelling to the desired destination without dropping the object.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…It is based on Ant Colony Optimization (ACO) meta heuristic, which is adopted to enhance the paths with the best-quality function. The assessment of this function depends on multi-criteria metrics such as the minimum residual battery power, hop count, average energy of the route and average energy of the network. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimisation of distributed generation in electric power systems using fuzzy-genetic algorithm approach by Akorede, Mudathir Funsho

    Published 2011
    “…The other model is designed for radial distribution networks operating at 33 kV and below voltage levels. The main objective functions considered in this model are maximisation of cost savings arising from energy loss, minimisation of line voltage drop, and maximisation of the transfer capability of the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method by Lawal, Sani Mohammed

    Published 2012
    “…PSO is among the meta-heuristics search methods like Genetic Algorithm (GA) but has been found to be computationally efficient, because it uses less number of functions for evaluation compared to GA that has genetic operators (Selection, crossover and mutation) and also the computational effort (time) required by PSO to arrive at high quality solutions is less than the effort required to the same high quality solutions by other heuristic search methods. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A smart handover strategy for 5G mmWave dual connectivity networks by Abdullah, Nor Fadzilah, Gannapathy, Vigneswara Rao, Nordin, Rosdiadee, Abu-Samah, Asma

    Published 2023
    “…While it was originally designed for 4G and subsequently enhanced for 5G, the effectiveness of this functionality requires further refinement to meet the demands of future mobile networks. …”
    Get full text
    Get full text
    Get full text
    Article