Search Results - (( developing developing general algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- developing developing »
- java implementation »
- implementation rsa »
- general algorithm »
- rsa algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Developing A General Algorithm For Ball CurveWith GC2.
Published 2005“…This paper dwells in developing a general algorithm for constructing a piecewise Ball Curve with curvature continuity (GC2). …”
Get full text
Get full text
Conference or Workshop Item -
7
Generalized Triad Design Algorithms
Published 2012“…Previous studies on TD(v) reported its existence when v≡1 or 5 (mod 6) and TD(7) was developed by using a brute-force method. In this study, generalized and new algorithms for developing TD(v) for any v = 6n + 1 or v = 6n + 5 were developed. …”
Get full text
Get full text
Thesis -
8
-
9
New Generalized Algorithm for Developing k-Step Higher Derivative Block Methods for Solving Higher Order Ordinary Differential Equations
Published 2018“…This article presents a new generalized algorithm for developing k-step (m+1) derivative block methods for solving mth order ordinary differential equations. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…There are five general steps implemented to develop the prototype. …”
Get full text
Get full text
Thesis -
12
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
13
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
14
-
15
-
16
Investigating Inclusion of Safety Metrics for Safe Route Determination on Pedestrian Map
Published 2011Get full text
Get full text
Final Year Project -
17
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…In the fourth phase, the newly developed algorithm undergoes testing on the formulated ROOPs and compared to several contemporary optimizer algorithms. …”
Get full text
Get full text
Thesis -
18
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…This is to ensure the generalized performance, flexible strengths and robustness of the OSA prediction system developed. …”
Get full text
Get full text
Thesis -
19
Real-time algorithmic music composition application.
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article
