Search Results - (( basic using acs algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- acs algorithm »
- rsa algorithm »
- basic using »
- using acs »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Performance study of adaptive filtering algorithms for noise cancellation of ECG signal
Published 2023“…Removal of noises from ECG (Electrocardiogram) signal is a classical problem. Moreover, nullifying AC and DC noises using the two adaptive algorithms-the LMS and the RLS from the ECG is a new study in biomedical science. …”
Conference paper -
7
Embedding Malaysian House Red Ant Behavior into an Ant Colony System
Published 2008“…Problem statement: Ant Colony System (ACS) is the most popular algorithm used to find a shortest path solution in Traveling Salesman Problem (TSP). …”
Get full text
Get full text
Citation Index Journal -
8
-
9
Determination of power flow and loss allocation using superposition theory method
Published 2011Get full text
Article -
10
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
Published 2006“…SNT-AC uses an admission control algorithm to restrict flows in and out of the BSS. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
-
14
-
15
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…Subsequently, a re-scoring rank was generated by AnkPlex using a combination of a decision tree algorithm and logistic regression. …”
Get full text
Get full text
Article -
16
Integrated artificial intelligence-based classification approach for prediction of acute coronary syndrome
Published 2014“…In the second stage, a registry entitled “Acute Coronary Syndrome Event — in Kermanshah, Iran (ACSEKI)” was designed and established as the first ACS registry in Iran. The following results were obtained when classification of the ACS types used the conventional “single AI-based” methods. …”
Get full text
Get full text
Get full text
Thesis -
17
Students Activity Recognition By Heart Rate Monitoring In Classroom Using K-means Classification
Published 2024Get full text
journal::journal article -
18
-
19
INTELLIGENT OPTIMIZATION OF INTERLINE POWER FLOW CONTROLLER IN TRANSMISSION SYSTEM
Published 2010“…Flexible AC Transmission system (FACTS) controllers are widely accepted worldwide to provide benefits in increasing power transfer capability and maximizeing the use of the existing transmission networks. …”
Get full text
Get full text
Thesis -
20
