Search Results - (( based implementation during algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- implementation during »
- based implementation »
- java implementation »
- implementation rsa »
- during algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…Matlab/Simulink was used for the simulation studies. Additionally, the algorithms were digitally implemented on the dSPACE ACE1104 platform. …”
Get full text
Article -
7
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…The accuracy rate attained is based on implementation of decision fusion using AND rule during classification. …”
Get full text
Get full text
Thesis -
8
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Implementation of Biological Sprouting Algorithm for NoC Fault Tolerance
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Zest Based Visualization for Requirements Negotiation
Published 2011“…We have formulated a conceptual diagram on which to base the design and development process of the groupware for implementing the Zest algorithm. …”
Get full text
Get full text
Article -
12
Autonomous path planning robot using geographical information
Published 2008“…The purpose of this project is initially to present an implementation of a guidance algorithm based on the geometrical analysis for the adoption of path planning problem. …”
Get full text
Learning Object -
13
-
14
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A study of fluctuations in genetic algorithm optimized network in data centre
Published 2017“…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
Get full text
Get full text
Article -
16
Design and development of sensor based traffic light system
Published 2006Get full text
Get full text
Get full text
Article -
17
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007“…Fuzzy set theory is used to capture the vagueness of the workload during redistribution period. Fuzzy set theory is used to capture the vagueness of the workload during redistribution period. …”
Get full text
Get full text
Get full text
Article -
18
Fetal QRS complex Detection Algorithm for FPGA Implementation
Published 2005“…The algorithm is based on crosscorrelation, adaptive thresholding and statistical properties in the time domain. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…The results indicate that, by implementing the UBACO, the weighted comprehensive complexity is reduced by 40.5% as compared to the UCON based policy proposed by Martinelli and Mori (2010). …”
Get full text
Get full text
Thesis
