Search Results - (( using simulation table algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method by Chin, Wei Chun

    Published 2018
    “…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system by Retas, Zain

    Published 2023
    “…Secondly is to design a new control strategy that will provide good tracking performance of the XY table. The final objective is to validate the proposed technique through simulation using MATLAB/Simulink software and experimental work using real plant of Googoltech XY table. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…Water table modelling based on ANNs and ANFIS technology were developed to simulate the water table fluctuations based on the relationship between the variations of rainfall, humidity, evaporation, minimum and maximum temperature and water table depth. …”
    Get full text
    Get full text
    Thesis
  11. 11

    OPTIMIZATION OFADVANCEDENCRYPTION STANDARD (AES) IN FPGA IMPLEMENTATION USING S-BOX INTEGRATION by Lee, Yi Lin

    Published 2004
    “…Thus, in this project, the AES cryptograph was simulated with FPGA, by using Verilog HDL. The main objectives are the architectural and algorithmic optimizations of the AES implementation, which would in turn benefit applications that are both speed and area critical. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    A multiobjective simulated Kalman filter optimization algorithm by A. Azwan, A. Razak, Mohd Falfazli, Mat Jusof, Ahmad Nor Kasruddin, Nasir, Mohd Ashraf, Ahmad

    Published 2018
    “…It is a further enhancement of a single-objective Simulated Kalman Filter (SKF) optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Resource management in grid computing using enhanced ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza, Abdul Nasir, Husna Jamal

    Published 2010
    “…Simulation approach has been used to test the performance of the algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    An adaptive relay selection scheme for enhancing network stability in VANETs by Al-Kharasani, Ameen Mohammed Abdulkarem, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala, Mohd Hanapi, Zurina

    Published 2020
    “…Moreover, the network scalability is enhanced by adaptively selecting most sustainable paths based on a signal strength beacon and the mobility degree of a node, which reduces significantly minimizes the size of control messages overhead as well the routing tables recalculation process. Simulation experiments using the network simulator are presented to demonstrate the effectiveness of our solution. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Dynamic obstacle handling in multi-robot coverage by Tay, Wing Le

    Published 2024
    “…It then generates a new avoidance velocity for robots, enabling them to avoid dynamic obstacles while achieving complete coverage. The simulations were conducted by using MATLAB to demonstrate the superiority of Modified Lloyd’s algorithm with VO over existing Lloyd’s algorithm in terms of average of total number of collisions between robots and dynamic obstacle during coverage task. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys by Nejad, Farshid Hossein, Sabah, Saman, Jam, Amid Jamshidi

    Published 2014
    “…Substitution table or S-Box is the major core of AES algorithm and it is used to provide confusion capability for AES. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Modelling of multi-robot system for search and rescue by Poy, Yi Ler

    Published 2023
    “…The simulations conducted using MATLAB demonstrate the superiority of the MPSO algorithm over the PSO algorithm in terms of average path length and execution time of all robots in all three proposed scenarios: 16 meter shorter and 7.1 seconds faster in the first scenario, 17.89 meters shorter and 6.14 seconds faster in scenario 2, and 6.18 meters shorter and 8.47 seconds faster in scenario 3. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis