Search Results - (( waste reduction using algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Development of novel algorithm features in the modelling of cyclic processes by Choong, Thomas S.Y., Paterson, William R., Scott, David M.

    Published 2002
    “…In principle, the algorithm could be used for many cyclic process. Air separation using rapid pressure swing adsorption (RPSA) is used as an illustration. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A greedy heuristics multiple criteria model for solving multi-landfill site selection and plant propagation algorithm for improving waste collection vehicle routing solutions by Nur Azriati, Mat

    Published 2023
    “…This research focuses on two solid waste management (SWM) problems, particularly the landfill site selection problem (LSSP) and the waste collection vehicle routing problem (WCVRP). …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Nearest greedy for solving the waste collection vehicle routing problem: A case study by Mat, Nur Azriati, Benjamin, Aida Mauziah, Abdul-Rahman, Syariza, Wibowo, Antoni

    Published 2017
    “…This paper presents a real case study pertaining to an issue related to waste collection in the northern part of Malaysia by using a constructive heuristic algorithm known as the Nearest Greedy (NG) technique. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    The classification of FTIR plastic bag spectra via label spreading and stacking by Almanifi, Omair Rashed Abdulwareth, Ng, Jee Kwan, Anwar P. P., Abdul Majeed

    Published 2021
    “…Whereas plastics are a group of the most useful materials, widely used in all walks of life, the plastic waste that is produced daily poses a great threat towards wildlife and the planet as a whole. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Incorporating energy generation process in environmental assessment of a biopharmaceutical process by Auni Hamimi, Idris

    Published 2015
    “…Therefore, this work aims to estimate the PET value from WFT and pure steam generation using a simple algorithm which is modified from Waste Reduction (WAR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Determination of energy usage and potential environment impact (pei) of a vapor compression distillation system for production of water for injection (wfi) in pharmaceutical indust... by Siti Nabihah, Abdul Latif

    Published 2014
    “…The amount of PET were analysed in waste reduction (WAR) algorithm using the amount of energy usage adapted from simulation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks by Muftah, Shalghum Khaled

    Published 2022
    “…The lowest bound is obtained with the maximum allowable that meets TT latency deadlines using the OFWOS algorithm. Thus, combining OFWOS and AVB-OBTTW evaluations can be a helpful guide for TSN designers to implement tighter and more trusted GCL schedules.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Snort-based smart and swift intrusion detection system by Olanrewaju, Rashidah Funke, Khan, Burhan Ul Islam, Najeeb, Athaur Rahman, Ku zahir, Ku Nor Afiza, Hussain, Sabahat

    Published 2018
    “…The simulation is performed using MATLAB. Findings: The proposed system has been verified to have high accuracy rate, high sensitivity as well as a reduction in false positive rate. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Incorporating Potential Environmental Impact from Water for Injection in Environmental Assessment of Monoclonal Antibody Production by A., Idris, Chua, Gek Kee, Mohamad Rizza, Othman

    Published 2016
    “…The PEI of these pollutants was estimated based on a modified Waste Reduction (WAR) Algorithm. For data generation, MED was simulated in SuperPro Designer®. …”
    Get full text
    Get full text
    Get full text
    Article