Search Results - (( basic computer assisted algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- assisted algorithm »
- java application »
- application rsa »
- basic computer »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A dataglove hardware design and real-time sign gesture interpretation.
Published 2023Conference Paper -
7
-
8
-
9
-
10
-
11
UiTM panic button using location-based Algorithm / Fatin Munirah Musa
Published 2015Get full text
Get full text
Thesis -
12
An interactive C++ programming courseware (SIFOO) / Mazliana Hasnan … [et al.]
Published 2012Get full text
Get full text
Book Section -
13
-
14
-
15
Computer aided interactive pressure vessel design
Published 2008“…Designing a pressure vessel using a handbook is troublesome and not interactive. Therefore computer aided software is created to assist the users, however due to business benefit, the computer aided software for designing pressure vessel are not for sale or pricey. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…Our main objective is to compute encryption process and develop decryption schemes using Mellin Transformation and to modify the basic El Gamal system with the application of Mellin-Kamal Transformation. …”
Get full text
Get full text
Student Project -
17
Interval-valued fuzzy soft topology and its applications in group decision-making problems
Published 2022“…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
Get full text
Get full text
Thesis -
18
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…It also achieves confidentiality, integrity and avoids any no-repudiation attack. The computational overhead shows that TLwS is at least 40% better than popular algorithm such as SeDS, UAKA-D2D, and D2D-Assist. …”
Get full text
Get full text
Thesis -
19
i-ManGoeS
Published 2017“…Human Human activity system is an essential area in computer vision, with its wide range of applications including ambient assisted living. …”
Get full text
Get full text
Get full text
Book Section -
20
Mobile application for sign language learning with real time feedback
Published 2024“…Machine learning algorithms using MediaPipe and deep learning will analyse users' hand motions to provide corrections for improving technique. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
