Search Results - (( basic complex based algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- basic complex »
- complex based »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Basically, the proposed of FUHS16, UHDS16 and UHDS8 algorithm produces the best motion vector estimation finding based on the block-based matching criteria. …”
Get full text
Get full text
Get full text
Book Chapter -
7
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Among basic voting algorithms, average voter and weighted average voter have higher availability but unfortunately they have higher time and calculation complexity in large scale systems. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
-
12
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
13
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
Get full text
Get full text
Get full text
Article -
14
Communication and computational cost on parallel algorithm of PDE elliptic type
Published 2009Get full text
Get full text
Book Section -
15
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
Get full text
Get full text
Thesis -
16
-
17
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…The algorithm is designed based on two basic works in which to calculate number of trees and divide an area into blocks. …”
Get full text
Get full text
Conference or Workshop Item -
18
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
Get full text
Get full text
Thesis -
19
Agent-based extraction algorithm for computational problem solving
Published 2015“…On the other hand, agent-based model offers a good method to solve complex computational problems. …”
Get full text
Get full text
Thesis -
20
Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing
Published 2020“…Moreover, the accuracy of the proposed projected signal (py>) is proven when the sinusoidal signal shows right angle (θ=90°) and the area of recovered projected signal (py>) is reduced by around 46.2891% in cm2 comparing with random signal (y>) in TQM algorithm. In addition to that, by proposing the projected signal (py>) in PQMCC technique, complexity of TQM algorithm is reduced from second order of big notation O(Nc2) to first order O(Nc).In summary, the outcome of PQMCC technique based on noise attenuation, accuracy, and complexity reduction has achieved and proven in this thesis.…”
Get full text
Get full text
Thesis
