Search Results - (( java implementation rsa algorithm ) OR ( using computational study algorithm ))

Refine Results
  1. 1

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…In this thesis study, hybrid Genetic Algorithm and Bat Algorithm proposed to solve the task scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7
  8. 8

    Quantum Processing Framework And Hybrid Algorithms For Routing Problems by Soltan Aghaei, Mohammad Reza

    Published 2010
    “…A uniform platform was proposed for the QAPU used in the present study. At first, the hybrid architecture was designed for the quantum algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES) by Kamal Khairi Supaprhman

    Published 2022
    “…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…However, in this wide use of this computer network, the privacy of computer users is in danger. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…The LIA is considered a novel algorithm that adapts the study of locust movement behaviour from biology to job scheduling in the cloud computing environment. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…Thus, Discrete Event Simulation is used as the research methodology in this study. In brief, this research aims to solve resource management issues so as to enhance the grid computing performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…This study contributes significantly in reducing the computational complexity and running time as compared with Normal Parameter Reduction algorithm (NPR) and New Efficient Normal Parameter Reduction algorithm (NENPR).…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An efficient model for indoor radio signal prediction and coverage estimation / Md. Sumon Sarker by Md. Sumon, Sarker

    Published 2011
    “…Ray tracing is of vast use in the field of computational electromagnetic, such as the well known shooting and bouncing ray (SBR) algorithm. …”
    Get full text
    Get full text
    Thesis