Search Results - (( after implementation using algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- after implementation »
- implementation using »
- java application »
- using algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…In this report, it analyzes an application of repetitive control algorithm that deal with periodic disturbance.. To investigates the possibility of using a truncated finite impulse response (FIR) model approximation to implement a well-known gradient type repetitive control algorithm. …”
Get full text
Get full text
Student Project -
7
Autonomous path planning robot using geographical information
Published 2008“…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
Get full text
Learning Object -
8
Implementation of an autonomous mobile robot navigation algorithm using C language
Published 2009“…The objective of the project is to develop navigation algorithm for the autonomous mobile robot. After that, implement the navigation algorithm on the mobile robot and without using the external sensor for navigation of the mobile robot to reach the specified point. …”
Get full text
Get full text
Final Year Project -
9
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Interactive jigsaw puzzle using backtracking algorithm / Amizah Mohd Kamaruzaman
Published 2012“…After testing the developed jigsaw puzzle by comparing the result with automatic jigsaw puzzle solver using Backtracking algorithm, it shows that Backtracking algorithm are not suitable algorithm to be used to develop the interactive jigsaw puzzle because it takes longer time in solving the game as compared to Backtracking algorithm that used in automatic jigsaw puzzle solver that was found in previous research.…”
Get full text
Get full text
Thesis -
11
Enhancement Of Wifi Indoor Positioning System
Published 2011“…The algorithm calculates the distances from the RSSs col- lected around the area, and checks for an error occurrence after the location estimation is calcu- lated with Least Square Algorithm (LSA). …”
Get full text
Get full text
Thesis -
12
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…This method is names after Julius Caesar who using this method to communicate with his generals. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
14
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
15
CAR TRACTION CONTROL SYSTEM
Published 2007“…This project explores the potential of implementing fuzzy logic algorithm for traction control system using VHDL. …”
Get full text
Get full text
Final Year Project -
16
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
17
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…Approach: In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the AIMD algorithm after developing it to find a new approach, as we called it the New-AIMD algorithm to measure the bottleneck link utilization and use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
18
Antenna design using left-handed materials
Published 2008“…After modeling, the algorithm is implemented in DSP by using C and Code Composer Studio. …”
Get full text
Get full text
Get full text
Monograph -
19
Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2011“…The NCTUns simulator is used to obtain the results after implementing the modifications to the mechanism.…”
Get full text
Get full text
Get full text
Article -
20
Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60
Published 2009“…Experimental results are obtained through test s conducted and after several analyses; it is found out that RGB - H - CbCr presents the best algorithm to be used in e xtracting the human skin colour, after a slight modification.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
