Search Results - (( programming probability function algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  10. 10

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The demands in SIRP are modeled by some probability functions and due to the stochastic nature of customer demands, the service levels constraint where it limits the stock out probability at each customer and the probability of overfilling the stock of each customer is introduced in this study. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Enhancing Power System Resilience Through Evolutionary Programming for High Impact Low Probability Events by Zakaria F., Musirin I., Kamari N.A.M., Aminuddin N., Johari D., Shaaya S.A., Bajwa A.A., Kumar A.V.S.

    Published 2025
    “…This paper presents enhancing power system resilience through evolutionary programming for high-impact low probability (HILP) events. …”
    Conference paper
  14. 14
  15. 15
  16. 16
  17. 17

    Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain by Roslee, Muhammad Sharifuddin

    Published 2022
    “…Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
    Get full text
    Get full text
    Monograph
  18. 18

    Optimal assignments of versions to processors in fault-tolerant computer systems by Leow, Soo Kar, McAllister, David F.

    Published 1988
    “…For voting system, k must be at least 2 and, in this case the objective function is non-linear. This implies that linear assignment algorithms cannot be used to obtain the optimal assignment. …”
    Get full text
    Get full text
    Article
  19. 19

    Nonparametric predictive inference forest fire dashboard by Amirah Hazwani, Roslin, Noryanti, Muhammad

    Published 2024
    “…It also included a predictive function using the R programming language software as its main task. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20