Search Results - (( java implementation rsa algorithm ) OR ( using services using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…In this paper, asymmetric key algorithm is used. Asymmetric key algorithm is also known as public-key cryptography, is a class of cryptographic algorithms with require two separate keys, one is secret (private) key and another one is public key. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Genetic algorithm was widely used because of its accuracy and simplicity. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A GENETIC ALGORITHM APPROACH TO THE SELECTION OF CLOUD COMPUTING SERVICES by Samurol @ Mohd Faisal, Narissa Sophea

    Published 2019
    “…This paper will discuss on the use of Genetic Algorithm (GA) approach in the selection of cloud services, which is widely used by organizations to enhance their business efficiency. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Exp-bet packet scheduling algorithm for multiple traffic services in long term evolution (LTE) system / Ku Siti Syahidah Ku Mohd Noh by Ku Mohd Noh, Ku Siti Syahidah

    Published 2016
    “…Most mobile devices today support multimedia services and legacy mobile services such as voice, short message service (SMS) and multimedia messaging service (MMS). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-objective service restoration in distribution networks using genetic algorithm by Moazami, Ehsan

    Published 2013
    “…This thesis presents a new approach of supply restoration service using the Genetic Algorithm. The GA is robust in searching a global optimal solution for the large-scale combinatorial optimization problems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Minimization of traveling time for courier services using Floyd-Warshall algorithm (case study in Seremban 3) / Nur Haifa Nadhira Mohd Hisham, Norfatehah Hairuddin and Wan Nur Amira Natasya Wan Anuar by Mohd Hisham, Nur Haifa Nadhira, Hairuddin, Norfatehah, Wan Anuar, Wan Nur Amira Natasya

    Published 2023
    “…As for the result, the shortest path for the courier was obtained. By using the proposed algorithm, courier services may find the shortest traveling time possible. …”
    Get full text
    Get full text
    Student Project
  13. 13
  14. 14

    Optimal penalty method in distribution service restoration using genetic algorithm by Moazami, Ehsan, Ab Kadir, Mohd Zainal Abidin, Hizam, Hashim, Izadi, Mahdi, Mirzaei, Maryam

    Published 2013
    “…This study presents a new approach of supply restoration service using the Genetic Algorithm (GA). A new hybrid Genetic Algorithm is proposed for reducing the search space. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    Sentiment analysis for airline services on Twitter using deep learning with word embedding / Mawada Mohamed Nour El Daim El Khalifa by Mawada Mohamed , Nour El Daim El Khalifa

    Published 2020
    “…This problem has led to low accuracy in predicting Airline Services using Twitter data. Meanwhile, in recent years, Deep Learning algorithms for Sentiment Analysis has emerged as one of the most popular algorithms, which provides automatic feature extraction, rich representation capabilities, and better performance than most of the traditional learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Credit scoring for Cooperative of financial services using logistic regression estimated by genetic algorithm by Mustafa, Mamat, Sukono, Firman, Asep, Sholahuddin

    Published 2014
    “…As a numerical illustration, the method used to analyze the credit scoring on a cooperative of financial services in Indonesia. …”
    Get full text
    Get full text
    Article
  19. 19

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Last throughput and quality-of-service aware (LTQA) scheduling algorithm in long term evolution (LTE) femtocell network / Muhammad Naqiuddin Sahrani by Sahrani, Muhammad Naqiuddin

    Published 2022
    “…The simulation of the scheduling algorithm was conducted using NS-3 and the performance of these packet scheduling algorithms was evaluated based on the performance metrics of throughput, delay, PLR and fairness for the VoIP, video and FTP applications. …”
    Get full text
    Get full text
    Thesis