Search Results - (( java application rsa algorithm ) OR ( parallel relation between algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Parallel matrix-multiplication algorithm on network of workstations by Md. Aminuddin, Rusdi, Abdullah, Rosni, Hassan, Suhaidi

    Published 2004
    “…We present the comparison in terms of speed between serial algorithm and the parallel algorithm when we run them on our cluster. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
    Get full text
    Get full text
    Thesis
  8. 8

    A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences by M. Othman, Razib, Deris, Safaai, Md. IIlias, Rosli

    Published 2008
    “…The genetic similarity algorithm combines semantic similarity measure algorithm with parallel genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Application of inerter in passenger vehicle suspension systems / Soong Ming Foong by Soong, Ming Foong

    Published 2015
    “…Inerter is a suspension element with the property that the force generated at its two terminals is directly proportional to the relative acceleration between the terminals, similar to the way a spring reacts to relative displacement and a damper to relative velocity. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Pembinaan dan pelaksanaan algoritma selari bagi kaedah kelas TTHS dan TTKS dalam menyelesaikan persamaan parabolik pada sistem komputer selari ingatan teragih by Alias, Norma

    Published 2004
    “…This thesis encompasses studies on recent advances in the development of parallel algorithmic techniques to solve large-scale problems involving the solution of systems of linear equations. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Enhancement of height system for Malaysia using space technology: the study of the datum bias inconsistencies in Peninsular Malaysia by Mohd. Omar, Kamaludin, Ses, Shahrum, Mohamed, Azhari

    Published 2003
    “…In this study, optimal algorithms were investigated to model biases between local vertical datum in Peninsular Malaysia and the datums implied by by EGM96, OSU91A and the regional Gravimetric Geoid in South_East Asia. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates by Hussein Fayiz, Mohammad Al-Khatib

    Published 2012
    “…This thesis proposed several design solutions for the aforementioned curves byvarying the degree of parallelism for ECC designs. The proposed designs provided an attractive trade-off between mentioned factors, which improved these factors. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hybrid flow shop scheduling with energy consumption in machine shop using moth flame optimization by M. F. F., Ab Rashid, Ahmad Nasser, Mohd Rose, N. M. Zuki, N. M.

    Published 2022
    “…The results were also compared with relatively recent algorithm such as Whale Optimization Algorithm and Harris Haws Optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…At the implementational level, the algorithm is translated into various artificial neural architectures. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…Therefore, detecting the black hole in the network is substantial since MANET depends on the cooperation between adjacent nodes. In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis