Search Results - (( ((java using) OR (data using)) context algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- context algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The system architecture which consists of a user interface, web framework and storage data. D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
7
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
8
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…Hence, the priority of data needs to be redefined according to its context to ensure reliability and timeliness of critical data. …”
text::Thesis -
9
Context aware traffic scheduling algorithm for power distribution smart grid network
Published 2023Article -
10
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
11
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness. …”
Get full text
Get full text
Thesis -
12
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…On top of a well-rounded multifaceted algorithm, this work contributes a much needed research framework for this context with a test-bed of data that must make future research endeavors more convenient. …”
Get full text
Get full text
Thesis -
13
Extracting Tweets Using R in The Context of Ethical Issues
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman
Published 2023“…Moreover, the languages generated by algebraic sum fuzzy splicing systems and their variants are developed by considering the threshold and the languages generated are categorized according to the Chomsky hierarchy. An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
Get full text
Get full text
Thesis -
15
Confidentiality based file attributes and data classification using TsF-KNN
Published 2015“…Many ML algorithms have been proposed to solve different data management issues, but the prediction of the confidential data and non- confidential data in a data file is still a challenging research gap. …”
Get full text
Get full text
Conference or Workshop Item -
16
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…To address this issue, we propose an efficient algorithm to measure the similarity indexes of multivariate data sets using a non-metric-based methodology. …”
Get full text
Get full text
Article -
17
Analysis and evaluation of various aspects of solar radiation in the Palestinian territories
Published 2023“…Each has a distinctive predominant feature, especially in the context of statistical indicators. They were calculated using both the monthly average daily data and the daily data sets. …”
Article -
18
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness [1]. …”
Get full text
Get full text
Get full text
Article -
19
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
Get full text
Get full text
Article -
20
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. …”
Get full text
Get full text
Article
