Search Results - (( basic relationship computer algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- relationship computer »
- java implementation »
- basic relationship »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
CSC645 - Algorithm Analysis and Design / College of Computing, Informatics and Media
Published 2022“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
7
CSC645: Algorithm Analysis and Design / College of Computing, Informatics and Mathematics
Published 2019“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
8
-
9
Memory-based Immune Network for Multi-Robot Cooperation
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Multi-Robot Cooperation using Immune Network with Memory
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…It is undeniable that a digital native must begin with at least a basic level of computer knowledge in order to manage their education and daily life. …”
Get full text
Get full text
Get full text
Article -
13
Effort Estimation Model for Function Point Measurement
Published 2007“…We proposed that a project’s functionality in the terms of function points has an approximately linear relationship to the final effort computation. The investigation had carried out on between the functionality and final effort before the model was generated. …”
Get full text
Get full text
Thesis -
14
Interval-valued fuzzy soft topology and its applications in group decision-making problems
Published 2022“…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
Get full text
Get full text
Thesis -
15
A Refined Immune Systems Inspired Model for Multi-Robot Shepherding
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
16
POISSON EQUATION FOR ELECTROSTATIC FIELD USING THE FINITE DIFFERENCE METHOD
Published 2019Get full text
Get full text
Final Year Project Report / IMRAD -
17
Neural Network – A Black Box Model
Published 2024“…A variety of metaheuristic algorithms have been used to train ANN, including Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Ant Colony Optimization (ACO), Tabu Search (TS), and Harmony Search (HS). …”
Get full text
Get full text
Get full text
Book Chapter -
18
Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim
Published 2014“…The improvised GDAis able to reduce computer running time as compared to previous algorithm and able to deals with a sparse graph. …”
Get full text
Get full text
Thesis -
19
Synthesis of Heat Exchangers Network (HEN) by Revisiting the Method Based on 2nd Law of Thermodynamics
Published 2009“…Future works are including the transformation of algorithm into GAMS or other mathematical programming tools.…”
Get full text
Get full text
Final Year Project -
20
A Refined Immune Systems Inspired Model For Multi-robot Shepherding
Published 2010Get full text
Get full text
Conference or Workshop Item
