Search Results - (( program using normalization algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…I used different types of optimization algorithms to improve the performance of the neural networks. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Statistical approach on grading: mixture modeling by Md. Desa, Zairul Nor Deana

    Published 2006
    “…The Gibbs sampler algorithm is applied using the WinBUGS programming package. …”
    Get full text
    Get full text
    Thesis
  13. 13

    GPS boundary navigation of DrosoBots using MATLAB simulation by Zainal Abidin, Zulkifli, Ngah , Vmi Kalthum, Arshad, Mohd Rizal, Kok , Chee Hou

    Published 2010
    “…The results from the experiment show that the Levy flight algorithm is more suitable to be used compared to normal random. …”
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Calculation of normalized input admittance for dielectric measurements of lossy materials (software development) / Mohamad Rizal Maarof by Maarof, Mohamad Rizal

    Published 1996
    “…In this project,we describe a computer program using FORTRAN 77 for calculation of input admittance of a smaller waveguide radiating into a larger waveguide. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multi -Objective Economic Dispatch Using Evolutionary Programming by Noor Azlan Bin Adnan

    Published 2023
    “…The designated algorithm of MOEP used MATLAB to run the simulations. …”
  16. 16
  17. 17

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis