Search Results - (( developing constructing stem algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- constructing stem »
- java application »
- application rsa »
- stem algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Building a French Stemmer Using a Dictionary of French Root Words
Published 1999“…In this thesis, a strong French stemming algorithm based on a dictionary of French root words is developed. …”
Get full text
Get full text
Thesis -
6
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
7
Development of an open-source and low-cost robotic arm based on STM32 microcontroller for promoting STEM education
Published 2023“…This study aims to promote STEM education by describing the development of a free, open-source robot joint with three degrees of freedom (DOF). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Multi depot dynamic vehicle routing problem with stochastic road capacity for emergency medical supply delivery in humanitarian logistics
Published 2022“…Specifically a PDS - Rollout Algorithm (PDS-RA) is adopted. Five variants of constructive base heuristics, Teach Based Insertion Heuristic (TBIH-1 - TBIH-5) are proposed complementing the PDSRA when dealing with the lookahead rollout involving stochastic road capacity. …”
Get full text
Get full text
Thesis -
9
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The Mean Square Error (MSE) and Peak-Signal-to-Noise Ratio (PSNR) are calculated. The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis
