Search Results - (( java implementation rsa algorithm ) OR ( using choice using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for bachelor in multimedia / Asmaa Musa by Musa, Asmaa

    Published 2007
    “…A large nimiber of techniques, such as Neurofuzzy algorithm methods are used to produce an efficient and effective system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Simulation algorithm of bayesian approach for choice-conjoint model by Zulhanif

    Published 2011
    “…Generally in Choice-Conjoint method the Multinomial Logit Model (MNL) is normally used to analyze choice conjoint data, but the MNL has some serious limitations. …”
    Get full text
    Thesis
  8. 8

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…Many normal parameter reduction algorithms exist to handle parameter reduction and maintain consistency of decision choices. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Simulation of fast recursive least square algorithm for echo cancellation system by Kamaruddin, Rosita

    Published 2003
    “…The performance of echo canceller depends on the choice of the adaptive filtering using Fast Recursive Least Square (FRLS) algorithm. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Tap setting transformer for loss minimization using genetic algorithm / Mazyudin Mokhtar by Mokhtar, Mazyudin

    Published 2007
    “…This paper presents an alternative approach to the use of load flow by incorporation Genetic Algorithm (GA) to search the optimal transformer tap setting in order to minimize losses. …”
    Get full text
    Get full text
    Thesis
  13. 13

    CPU Burst Processes Prioritization Using Priority Dynamic Quantum Time Algorithm: A Comparison with Varying Time Quantum and Round Robin Algorithms by Mohammed, Maysoon A., Mazlina, Abdul Majid, Balsam, A. Mustafa, Ghani, Rana Fareed

    Published 2015
    “…Round Robin scheduling algorithm is the most suitable choice for time shared system but not for soft real time systems due to a large turnaround time, large waiting time and high number of context switches. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Application of the Genetic Algorithms (GAs) in determining the optimal transformer tap setting for loss minimization using MATLAB / Mohd Syful Adly Abd. Wahab by Abd. Wahab, Mohd Syful Adly

    Published 2003
    “…In this way , the choice of the transformer tap setting can be determined whilst minimising losses and at the same time improved the voltage profile in the power system The performance of this Genetic Algorithms technique was tested using standard IEEE 6-bus system and analysis of results is presented.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Inversion Of Surface Wave Phase Velocity Using New Genetic Algorithm Technique For Geotechnical Site Investigation by Hamimu, La

    Published 2011
    “…The inverse procedure of surface wave phase velocity is a complicated problem for linear inversion approach because of its multi-model and highly nonlinear nature. Therefore the use of genetic algorithm (GA) optimization technique which is one of nonlinear optimization methods is an appropriate choice to solve surface wave inversion problem having high nonlinearity and multimodality. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimize the maximum flow of electricity capacity using Ford Fulkerson, Edmonds Karp and Goldberg Tarjan algorithm / Nik Nur Diyana Nik Mohd Huzaidi by Nik Mohd Huzaidi, Nik Nur Diyana

    Published 2024
    “…This research explores the optimization of electricity flow using the Ford Fulkerson, Edmonds Karp, and Goldberg Tarjan algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…This novel approacho for integrating separator Database and Framework using these choices of Java collections outperforms with pseudoprojectionin terms of CPU performance and memory. …”
    Get full text
    Thesis
  18. 18

    Obstacle Avoidance System in Underwater Glider by KHYE YEE, YONG

    Published 2017
    “…While Bug algorithm is had been used in underwater vehicles, A* algorithm are more commonly used in ground robots. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Accelerating graph algorithms with priority queue processor by Heng Sun, Ch'ng, Eik Wee, Chew, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…In this work, we demonstrate how to accelerate graph algorithms using priority queue processor. DijkstraÂ’s algorithm is chosen as the target implementation, as many state-of-the-art graph algorithms use DijkstraÂ’s algorithm at the heart of their computational engine. …”
    Get full text
    Get full text
    Article
  20. 20