Search Results - (( java implementation rsa algorithm ) OR ( system implementation method algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison for selection technique in genetic algorithm by Muhamad Azree, Mat Said

    Published 2006
    “…The purpose of this project is to make a comparison for three selection techniques in Genetic Algorithm.The Genetic Algorithm has been implemented in the previous module for Chess Tournament Management System.Base on previous system the selection method only using randomize.By this project module,only three selections method were use for the comparison.They are Roulette Wheel, Steady-State and Rank selection.The result for this comparison has determined the appropriate selection for Genetic Algorithm implementation in Chess Tournament Management System.This will help Chess Tournament Management System to provide a better optimize schedule.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Festive season balancing groceries optimization / Fairuz Mohamed Razi by Mohamed Razi, Fairuz

    Published 2012
    “…The most important part is during system design and implementation. In this phase, method use in Genetic Algorithm to optimize the system prototype is Rastrigin's function to calculate the fitness of the chromosomes.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The proposed system uses a fast and reliable method to detect traffic congestions. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid MPPT algorithm for mismatch photovoltaic panel application / Muhammad Iqbal Mohd Zakki by Mohd Zakki, Muhammad Iqbal

    Published 2019
    “…MATLAB/Simulink is used to develop, test, optimize, and verify the proposed hybrid MPPT algorithm, and PSO-PID tuning method, before embedded in the MPPT system for the hardware implementation as a research product. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…The proposed algorithm has been implemented in technical MATLAB package and tested with two examples namely, 18- and 49-bus systems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…The results of the fingerprint algorithm for localization shows higher accuracy compare to other methods and the implementation of this method are easy as user require only a mobile device equipped with Wi-Fi facilities to determine the location. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This research implemented both methods on secure Twisted Edwards curves (numsp384t1 and numsp512t1) using the affine coordinate system for clearer point representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Load flow method using genetic algorithm by Lok, C. W., Zin, A. A. M., Mustafa, M. W., Lo, Kueiming Lun

    Published 2003
    “…Genetic algorithms (GAs) are search methods based on the natural selection and natural genetics, while power flow studies, commonly known as load flow, form an important part of power system analysis. …”
    Get full text
    Conference or Workshop Item
  20. 20

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…The computation efficiency of the proposed algorithm has enabled the implementation of the soft robotic glove system prototype by using simple hardware.…”
    Get full text
    Get full text
    Thesis