Search Results - (( database application system algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- database application »
- system algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. …”
Get full text
Get full text
Thesis -
3
-
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
9
Indoor Location Sensing Using WLAN IEEE 802.11b
Published 2008Get full text
Get full text
Conference or Workshop Item -
10
Wi-Fi signals database construction using chebyshev wavelets for indoor positioning systems
Published 2019“…Unfortunately, this procedure requires huge amount of time, manpower and effort, which makes extensive deployment of indoor positioning system a challenging task. approach of constructing signal strength database from a minimal number of measurements using Chebyshev wavelets approximation. …”
Get full text
Get full text
Article -
11
-
12
Managing Fragmented Database Using BVAGQ-AR Replication Model
Published 2017Get full text
Get full text
Get full text
Article -
13
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015“…The objective of this study is to develop a searching function using Boyer-Moore Horspool algorithm based on keyword in a medical database. Therefore, we intend to provide an automatic search routine in the medical first aid application and evaluate performance of the proposed searching algorithm through character match percentage. …”
Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
Published 2015Get full text
Get full text
Conference or Workshop Item -
17
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…Through analysing the functional requirements of the system in the project, using MySQL database and Enhancer platform, the intelligent fault diagnosis management system of cloud computing power plant is designed and developed, which realises the functions of system modules such as system authority management, electronic equipment account, technical supervision, expert database, data centre. …”
Article -
18
Extraction Of Defensin Antimicrobial Peptide From SWISS-PROT Database Using Extended Boyer-More Algorithm.
Published 2007Get full text
Get full text
Conference or Workshop Item -
19
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
Published 2007Get full text
Get full text
Conference or Workshop Item -
20
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Published 2019“…Through the application of a password-based authentication technique, users are granted permission to access a secure system when the username and password matches with that logged in database of the system. …”
Get full text
Get full text
Get full text
Article
