Search Results - (( basic reflections from algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- basic reflections »
- reflections from »
- from algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Three-probe reflectometer algorithm for calculation of complex reflection coefficient of liquids / Aidil Saifan Abu Bakar
Published 2003“…In order to make precision measurement of magnitude and phase of reflection coefficient, the Three-Probe Reflectometer Algorithm has been used (which was implemented on the personal computer using Visual Basic 6 programming). …”
Get full text
Get full text
Thesis -
7
-
8
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…To achieve the first goal, the last reflection is separated from the LiDAR point cloud and the effective distance was calculated. …”
Get full text
Get full text
Get full text
Thesis -
9
Microprocessor implementation of three phase PWM switching strategies
Published 1999“…All the necessary microprocessor hardware/software techniques and algorithms required to implement and generate three-phase Pulse Width Modulation (PWM) are developed in detail, and demonstrated using practical results from an experimental microprocessor board. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
OPTIMIZATION-BASED METHOD FOR ESTIMATING THE TRANSMISSION RATE OF COVID-19 DURING THE LOCKDOWN IN MALAYSIA
Published 2023“…The well-known Susceptible-Infected-Removed (SIR) epidemiological model was fitted to the actual data of infected cases from the official press to closely reflect the observed COVID-19 outbreak in Malaysia. …”
Article -
11
Optimization-based method for estimating the transmission rate of COVID-19 during the lockdown in Malaysia
Published 2022“…The well-known Susceptible-Infected-Removed (SIR) epidemiological model was fitted to the actual data of infected cases from the official press to closely reflect the observed COVID-19 outbreak in Malaysia. …”
Get full text
Get full text
Article -
12
-
13
Surface and Near-surface Moisture Content Assessment using Multi-Temporal Satellite Images over Perak Tengah and Manjung Regions, Malaysia
Published 2013“…In order to generate the moisture maps, “Universal Triangle” algorithm was used for NOAA/AVHRR based on land Surface Temperature (Ts) and the Normalized Difference Vegetation Index (NDVI) extracted from images beside field measurements of θ. θ also estimated from MODIS through the extraction of soil wetness index (SWI) which is a sensitive parameter that controls the mechanism of land surface and the processes at the atmosphere. …”
Get full text
Get full text
Conference or Workshop Item
