Search Results - (( using visual basic algorithm ) OR ( ((java application) OR (java applications)) rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators by Abed I.A., Sahari K.S.M., Koh S.P., Tiong S.K., Jagadeesh P.

    Published 2023
    “…The movement and the configurations of the manipulators at the task points were visualized using a simulator developed via Visual Basic. …”
    Conference paper
  8. 8
  9. 9

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…A user friendly GUI is developed using VISUAL BASIC to interface the user commands with the Robot controller. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    VISUAL MOUSE (COLOR TRACKING) by BAHRUDIN, MUHAMMADMUSTAFA

    Published 2007
    “…The basic principle of this project would be distinguishing color and use its properties to move a cursor in MATLAB and draw as well.…”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15
  16. 16

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…The basic design of visual cryptography exploits the human visual system, to recover secret images. …”
    Get full text
    Get full text
    Thesis
  19. 19

    BMTutor research design: Malay sentence parse tree visualization by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2014
    “…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20