Search Results - (( process section process algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Image pre-processing algorithm for Ficus deltoidea Jack (Moraceae) varietal recognition: a repeated perpendicular line scanning approach by Ahmad Fakhri, Ab. Nasir, M Nordin, A Rahman, Nashriyah, Mat, Abd Rasid, Mamat, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…Some of researchers have developed the image pre-processing algorithm to remove petiole section. However, the algorithm was developed using semi-automatic algorithm which is strongly believed to give an inaccurate feature measurement. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon by Zenon, Nasaruddin

    Published 1990
    “…In Section 3.0 we will propose a modification to the V-B algorithm. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    An algorithm to measure unsymmetrical circle shape of intravascular ultrasound image using image processing techniques by Kutty, Suhaili Beeran, O. K. Rahmat, Rahmita Wirza, Kassim, Sazzli Shahlan, Madzin, Hizmawati, Hamdan, Hazlina

    Published 2021
    “…However, the measurement only offers by the existing software and some of the software needs human interaction to complete the process. The purpose of this paper is to present the algorithm to measure the region of interest (ROI) on intravascular ultrasound (IVUS) using an image processing technique. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…Detail explanations of i-RSA algorithm in propose algorithm section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Optimization of PID Tuning Using Genetic Algorithm by Tengku Ahmad Faris, Ku Yusoff, Mohd Farid, Atan, Nazeri, Abdul Rahman, Shanti Faridah, Salleh, Noraziah, Abdul Wahab

    Published 2015
    “…Thus, the objective of this research is to compare the performance of the conventional tuning method with the performance of tuning method by using genetic algorithm can be seen. Optimization was done on stripping section of distillation column by using genetic algorithm with population size of 20, 40, 60 and 80 and comparing the result with previous optimization using Ziegler-Nichols method. …”
    Get full text
    Get full text
    Article
  19. 19

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…The time taken for processing was round to be almost linearly related to the ROJ size and not at all effected by the number of sections. …”
    Get full text
    Get full text
    Thesis
  20. 20