Search Results - (( based content ((method algorithm) OR (path algorithm)) ) OR ( java application rsa algorithm ))
Search alternatives:
- method algorithm »
- java application »
- application rsa »
- path algorithm »
- based content »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…Our model can generate an appropriate learning path for learners based on their background and job goals. …”
Get full text
Get full text
Article -
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
-
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
African Buffalo Optimization (ABO): A New Metaheuristic Algorithm
Published 2015Get full text
Get full text
Get full text
Article -
11
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks
Published 2021“…This algorithm routes multimedia packets across a WSN by choosing high- throughput paths rather than always choosing the shorter path to the sink. …”
Get full text
Get full text
Article -
12
-
13
Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks
Published 2016“…However, as a result of contention-based nature of IEEE 802.11-based wireless mesh network, the node capacity is limited by the contention, interference caused by hidden nodes, data transmission over low rate links, and frequent interface switching. …”
Get full text
Get full text
Thesis -
14
-
15
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
16
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…In term of QoE subjective test, EnVADE algorithm score surpasses the score of other video streaming method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
Published 2019“…In term of QoE subjective test, EnVADE algorithm score surpasses the score of other video streaming method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A wavelet based watermarking algorithm for video
Published 2005“…So digital watermarking technique which aims at copyright protection of digital contents becomes more and more important, and various watermarking methods have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
19
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The content-based method is employed more widely though. …”
Get full text
Get full text
Thesis -
20
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis
