Search Results - (( java implementation rsa algorithm ) OR ( using total data algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The data source used as training data comes from the official Kaggle website, the data used in this study is data on the spread of the coronavirus collected from 2020 to 2021 with a total of 20,816 training data. …”
    Get full text
    Get full text
    Book Section
  7. 7

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…It is followed by identifying RES sites using spatial data and Multi-Criteria Decision Making-Analytical Hierarchy Process (MCDM-AHP) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Solving economic load dispatch problem using genetic algorithm method / Norliza Kamarulzaman by Kamarulzaman, Norliza

    Published 2009
    “…In this study, Genetic Algorithm method is used to overcome this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing by Tan, Sek Aun

    Published 2004
    “…Out of the six algorithms derived, Algorithm 6 showed the best correlation with the ground-truth data (R2 value of 0.9755 and RMSE value of 4.0107). …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A data driven approach to wind plant control using moth-flame optimization (MFO) algorithm by Idris, M. A. M, Hao, Mok Ren, Mohd Ashraf, Ahmad

    Published 2019
    “…Therefore, it is necessary to re-tune the controller of each turbine in the wind plant such that the total power generation is improved. This article presents an investigation of a data driven approach using moth-flame optimization algorithm (MFO) to the problem of improving wind plants power generation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Liquid slosh suppression by implementing data-driven fractional order pid controller based on marine predators algorithm by Mohd Tumari, Mohd Zaidi Mohd, Mustapha, Nik Mohd Zaitul Akmal, Ahmad, Mohd Ashraf, Saat, Shahrizal, Ghazali, Mohd Riduwan

    Published 2023
    “…The MPA is used as a data-driven tuning tool in finding the optimal FOPID controller parameters based on fitness function which consists of total norm of tracking error, total norm of slosh angle as well as total norm of control input. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Performance evaluation of caching placement algorithms in named data network for video on demand service by Abbas, Rasha Salem

    Published 2016
    “…There are two stages of activities resulted in the outcome of the study: The first is to determine the causes of delay performance in NDN cache algorithms used in VoD workload. The second activity is the evaluation of the seven cache placement algorithms on the cloud of video content in terms of the key performance metrics: delay time, average cache hit ratio, total reduction in the network footprint, and reduction in load. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…The objectives of this research are data mining are used to extract useful data from sales and product. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…While in the 49-bus system the existing 7 capacitors are rearrange using Genetic Algorithm in obtaining minimal total power losses. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Liquid slosh suppression by implementing data-driven fractional order PID controller based on marine predators algorithm by Mohd Zaidi, Mohd Tumari, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali, Nik Mohd Zaitul Akmal, Mustapha, Shahrizal, Saat

    Published 2023
    “…The MPA is used as a data-driven tuning tool in finding the optimal FOPID controller parameters based on fitness function which consists of total norm of tracking error, total norm of slosh angle as well as total norm of control input. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Adjusted 0-1 knapsack problem in cargo flow by using artificial bee colony algorithm / Nor Zuliiziati Md Jani by Md Jani, Nor Zuliiziati

    Published 2021
    “…The aim of this research is to determine the flow of the shipment based on volume and to determine the total cost based on the flow of shipment by using Artificial Bee Colony (ABC) algorithm. …”
    Get full text
    Get full text
    Student Project