Search Results - (( program planning data algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…This research starts with reviewing the previous researches to find the gap in knowledge and find the possible solutions of the gap found. Then, the data of the maintenance team from one of the utilities provider company in Malaysia was collected to be implemented in the development of a dynamic programming algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Vision-based robot indoor navigation by Teo, Zhin Hang

    Published 2022
    “…A different algorithm is created in the microcontroller to derive and perform the data delivered from the computer. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment by Kalaf, Kalaf, Bayda Atiya

    Published 2017
    “…For these proposed approaches, this study adopted a hybridization of a fuzzy programming, modify simulated annealing, and simplex downhill (SD) algorithm called Fuzzy-MSASD to resolve multiple objective linear programming APP problems in a fuzzy environment. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The obvious problem in this SM is it uses single communication system as there was no contingency plan in transferring the data when the signal strength was weak or failure during data transfer process. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Automated time series forecasting by Ismail, Suzilah, Zakaria, Rohaiza, Tuan Muda, Tuan Zalizam

    Published 2011
    “…Forecasting is one of the important tools in business environment because it assists in decision-making of strategic planning and controlling activities. Good planning and controlling procedure would lead to successful business.There are two categories of forecasting techniques; namely qualitative and quantitative.Qualitative technique is more towards judgmental forecasting and usually used when data is limited. …”
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    Development of a Production Planning and Control Software in Total Productivity Maintenance Environment by Lee, Pang Seng

    Published 2004
    “…A TPM based software program has been developed to ease the process of production planning and control in TPM environment by executing sequential methodology such as problem identification, literature review, problem formulation, data coliection, company operation review, flow chart system and program algorithm before test run in the company. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Budget visualizer using circle packing technique / Nursyahira Zulkeply by Zulkeply, Nursyahira

    Published 2019
    “…Furthermore, it is handy to understand the government future financial planning for Malaysia in an interactive way. This algorithm can be reusable to visualize any other financial data in hierarchy structure.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Determining the graduates employability using data analytics model by Matos Jr., Zenon A.

    Published 2023
    “…This will ultimately inform institutions and enable them to enhance their education delivery plans. These studies used a data analytics model to forecast the employability of graduates using the linear regression algorithm and the SMOreg algorithm, predict the number of graduates in the next 3 years in the BS Information Technology program, and determine the percentage of graduates who are employed and unemployed using the data sourced from the tracer study conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    The implementation of post-processing data thinning for multibeam echo sounding data by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2006
    “…The process to reduce the size is called data thinning. Data thinning algorithms should be capable in handling high volume of MBES data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    3D solid robot animation design based on ADAMS by Baojian Yang, Yongning Deng, Xia Yue, Tze, Kenneth Kin Teo

    Published 2023
    “…The feasibility of gait planning is verified by analyzing the dynamic images obtained from the simulation experiments and the experimental data of each joint vector. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20