Search Results - (( java implementation rsa algorithm ) OR ( using patterns path algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  7. 7

    Scheduling of batch process plant / Abdul Aziz Abu Bakar by Abu Bakar, Abdul Aziz

    Published 1995
    “…This research work is devoted to software development of scheduling and control algorithm of batch process plant using shortest path method developed by Dijkstra and K* shortest path method developed by Jin Y. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…While the voice pattern classification will be done by using DTW algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…While the voice pattern classification will be done by using DTW algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Development of behavior-based reactive navigation system for mobile robot by Mohd Hamami, Mohd Ghazali

    Published 2013
    “…The repeatability tests shown that the developed navigation algorithm able the robot to reach the target with the similar navigation path pattern outcome in each simulation tests. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Destination prediction based on past movement history by Waheed, Mihsaan

    Published 2020
    “…The results are promising and we also look at the combination of variables to use for such a use case.…”
    Get full text
    Thesis
  12. 12

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
    Get full text
    Get full text
    Thesis
  13. 13

    NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…The speaker recognition is performed using the back-propagation neural network (BPNN) algorithm to enhance the recognition performance. …”
    Get full text
    Get full text
    Article
  14. 14

    Path Planning Optimization For Solar-Powered Perpetual Flight Across The World by Lim, Guang Ming

    Published 2018
    “…The successful flight pattern done by (Tan) which has covered latitude of ±66 ºat various longitude is used in this research with the attempt to reach the global coverage. …”
    Get full text
    Get full text
    Monograph
  15. 15

    New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions by Mahmod Mohammad Altwallbah, Neda, Mohd Radzi, Mohd Amran, Azis, Norhafiz, Shafie, Suhaidi, Mohd Zainuri, Muhammad Ammirrul Atiqi

    Published 2022
    “…The proposed Trapezoidal rule based P&O algorithm is evaluated under three conditions: (1) under uniform irradiance (2) under shading conditions and (3) under sudden and step changes in irradiation levels as well as the transition between shading patterns. …”
    Get full text
    Get full text
    Article
  16. 16

    New reflector shaping methods for dual-reflector antenna by Quzwain, Kamelia, Yamada, Yoshihide, Kamardin, Kamilia, Abd Rahman, Nurul Huda, Ismail, Alyani

    Published 2022
    “…The accuracy of MATLAB program is ensured from the obtained ray path results, aperture distribution and radiation pattern. …”
    Get full text
    Get full text
    Article
  17. 17

    Local DTW coefficients and pitch feature for back-propagation NN digits recognition by Sudirman, R., Salleh, Shahruddin Hussain, Salleh, Sh-Hussain

    Published 2006
    “…The speech recognition is performed using the back-propagation neural network (BPNN) algorithm to enhance the recognition performance. …”
    Get full text
    Conference or Workshop Item
  18. 18

    Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom by Chai, Chen Chu

    Published 2018
    “…Six tessellation origami models consisting of three variations of Miura-ori, Russo’s Optical Illusion, Yoshimura and Ron Resch pattern were selected to investigate the transformation under different paths using the generative modeling tool. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhanced verbalization of ORM models by Curland, Matthew, Halpin, Terry

    Published 2012
    “…Thirdly, it provides an algorithm for verbalizing external uniqueness and frequency constraints over roles projected from join paths of arbitrary complexity. …”
    Get full text
    Get full text
    Teaching Resource
  20. 20

    Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…The speech recognition is performed using the back-propagation neural network (BPNN) algorithm to enhance the recognition performance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item