Search Results - (( ((developing code) OR (developing e)) based algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- developing code »
- application rsa »
- rsa algorithm »
- developing e »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Kinematic contact-impact algorithm with friction
Published 2001“…The developed algorithm is based on conservation of momentum and coefficient of restitution. …”
Get full text
Get full text
Article -
7
Steganography algorithm to hide secret message inside an image
Published 2011“…The proposed algorithm uses binary codes and pixels inside an image. …”
Get full text
Get full text
Article -
8
Framework of Designing Multiple Microcontroller Based Applications
Published 2011“…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. The stress is given to the use of assembly code and high-level tools, where the algorithms are described in the form of different graphical notations, i.e. block diagrams. …”
Get full text
Get full text
Conference or Workshop Item -
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…On the user side, a partial channel feedback scheme based on an adaptive CQI threshold is developed. …”
Get full text
Get full text
Thesis -
11
Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes
Published 2018“…The thesis proposes an error detection and correction algorithms using Hybrid RS-LDPC codes for the channel encoding and decoding in the home automation system. …”
Get full text
Get full text
Monograph -
12
Framework of Multi-Microcontroller Evaluation Tool for a use of Academic Environment
Published 2012“…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. The stress is given to the use of assembly code and high-level tools, where the algorithms are described in the form of different graphical notations, i.e. block diagrams. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Development and characterization of anonymous nuclear markers to determine genetic variation in two groupers species and their hybrids
Published 2015“…Locus specific markers were developed using 60 E. lanceolatus and 67 E. fuscoguttatus genomic sequences. …”
Get full text
Get full text
Get full text
Thesis -
15
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…Most of the algorithms got promising results and classify packets based on DSCP accurately. …”
Get full text
Get full text
Get full text
Article -
16
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Based on the analysis, the algorithm of neural network classifier corner detector for FCC was found to have more potentials in terms of accuracy of corner detection and suitability of the chain code. …”
Get full text
Get full text
Thesis -
17
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
Get full text
Get full text
Get full text
Book -
18
Algorithm analyzer to check the efficiency of codes
Published 2011“…This paper described how software metrics can be used in analyzing efficiency of the developed code in early stage of development. A tool (algorithm analyzer) was developed to enable analyze a given code to check its efficiency level and produce efficiency reports based on the analysis. …”
Get full text
Get full text
Conference or Workshop Item -
19
Speech compression using compressive sensing on a multicore system
Published 2011“…In this paper, a novel algorithm for speech coding utilizing CS principle is developed. …”
Get full text
Get full text
Proceeding Paper -
20
