Search Results - (( simulation notification system algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli by Ramli, Muhammad Hafiz

    Published 2020
    “…Meanwhile, an email notification was introduced in ICMP and HTTP based monitoring as a notification to the administrator when the failure occurs.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Image processing-based flood detection by Ariawan, Angga, Pebrianti, Dwi, Ronny, Akbar, Yudha Maulana, Margatama, Lestari, Bayuaji, Luhur

    Published 2019
    “…The citizens will get the information if they follow that account (early warning system) on Twitter. The result of this simulation using prototype that we have made is that the system can read the water conditions with an increase in accuracy reaching 99.6o/o.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…A multi-level alert system ensures early threat mitigation, with alarms, SMS, notifications, and email alerts to maximize awareness. ? …”
    Article
  10. 10

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 3, we propose a new online system to detect malicious spam emails and to adapt to the changes of malicious URLs in the body of spam emails by updating the system daily. …”
    Get full text
    Get full text
    Thesis