Search Results - (( java implementation rsa algorithm ) OR ( using program during algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…Using the dynamic programming algorithm developed, the model was also able to recalculate alternative schedules by replacing unavailable teams with other teams to avoid delays. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm by Anuar, Wadi Khalid, Lee, Lai Soon, Seow, Hsin Vonn, Pickl, Stefan

    Published 2021
    “…A matheuristic approach based on a reduced two-stage Stochastic Integer Linear Programming (SILP) model is presented. The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Final examination time table scheduling using integer programming with average time slot gap minimization by Nur Hidayah Abdul Jamil, Nor Aliza Ab Rahmin, Athirah Nawawi

    Published 2024
    “…In this research, our aim is to maximize the total amount of students’ study time to ensure that all students have sufficient time to study during exam weeks. We used an integer programming approach with an average time slot over the examination for this examination scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Software Classification Using Structure-Based Descriptors by Ramadan, Qusai Hussein

    Published 2009
    “…A total of 2800 programs have been used during the training process while two different datasets of size (28) were used for testing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Final examination time table scheduling using integer programming with average time slot gap minimization by Abdul Jamil, Nur Hidayah, Ab Rahmin, Nor Aliza, Nawawi, Athirah

    Published 2024
    “…In this research, our aim is to maximize the total amount of students’ study time to ensure that all students have sufficient time to study during exam weeks. We used an integer programming approach with an average time slot over the examination for this examination scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    CHAOS BASED BLOCK ENCRYPTOR by SARIN, FARHANA

    Published 2008
    “…The coding of encryption and decryption algorithms is created using C language. The coding compilation is using Borland C++ program. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    An optimal mesh algorithm for remote protein homology detection by M. Abdullah, Firdaus, M. Othman, Razib, Kasim, Shahreen, Hashim, Rathiah, Hassan, Rohayanti, Asmuni, Hishammuddin, Taliba, Jumail

    Published 2011
    “…This paper also shows that the use of the refinement algorithm increases the performance of the multiple alignments programs by at least 4%.…”
    Get full text
    Get full text
    Article
  14. 14

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20