Search Results - (( parallel realization based algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Improving parallel self-organizing map using heterogeneous uniform memory access / Muhammad Firdaus Mustapha by Mustapha, Muhammad Firdaus

    Published 2018
    “…The research continues to design a parallel SOM architecture based on literature study and implements on two types of architecture; standard HC and HUMA model. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Algebraic Net Class Rewriting Systems, Syntax and Semantics for Knowledge Representation and Automated Problem Solving by Tirri, Seppo Ilari

    Published 2013
    “…New results are obtained within construction of problem solving systems where solution algorithms are derived parallel with other candidates applied to the same net classes. …”
    Get full text
    Get full text
    Journal
  9. 9
  10. 10

    Zero Algorithms for Avoiding Crosstalk in Optical Multistage Interconnection Network by Ali Al-Shabi, Mohammed Abdulhameed

    Published 2005
    “…The experiments conducted have proven that the proposed algorithms are effective and efficient. They are based on routing algorithms to minimize the number of passes to route all the inputs to outputs without crosstalk. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…In addition, little performance gain can be realized through parallelism in the Boltzmann Machine Architecture. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced-PID Control Based Antagonistic Control For Pneumatic Artificial Muscle Actuators by Tan, Ming Hui

    Published 2016
    “…In this thesis, an antagonistic-based PAM system is designed and presented. Two identical PAM actuators are connected in parallel and vertical direction which imitate the human biceps-triceps system and emphasize the analogy between the artificial muscle and human skeletal muscle behavior. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13