Search Results - (( programming string _ algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Simulation of vibrating string by Loo, Twan Guan, Choy, Kam Heng

    Published 2001
    “…This project illustrates the steps involved in the computer simulation of a physical phenomenon by considering the problem of wave propagation in a thin elastic string. A computer program is developed to compute the shape of the string at any time, given any initial shape. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12
  13. 13

    Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin by Shamsudin, Muhamad

    Published 2001
    “…Longest Common Subsequence algorithm (LCS) has been developed to solve string matching problems. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Word segmentation of output response for sign language devices by Za'bah, Nor Farahidah, Muhammad Nazmi, Ahmad Amierul Asyraf, Azman, Amelia Wong

    Published 2020
    “…The proposed text segmentation method in this work is by using the dynamic programming and back-off algorithm, together with the probability score using word matching with an English language text corpus. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Genetic Mutation of Cowpea as a Constrained Stochastic Optimization Problem in Sustainability by Emmanuel, Okewu, Kehinde, Okewu, Siti Sarah, Maidin, Wong, Ling Shing

    Published 2023
    “…Using series of experiments in Python programming, we applied genetic algorithm to the genetic mutation of cowpea, a tropical leguminous plant and protein-rich crop. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Retrieving translated Al-Quran documents using edit distance technique / Ahmad Syukri Mohamad Zaid by Mohamad Zaid, Ahmad Syukri

    Published 2001
    “…This paper describes features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm by Chong, Kok Hen

    Published 2008
    “…ODCSD is a digital circuit structure design simulation program. Further more, a prototype hardware has been designed and constructed to test the success chromosome string, which called as GA based Logic Implementer (GALI). …”
    Get full text
    Get full text
    Thesis