Search Results - (( developing devices using algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- developing devices »
- implementation rsa »
- using algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…The study is divided into three stages which are developing heating element stage, developing algorithm for heat sensing stage and developing algorithm for data transmitting stage. …”
Get full text
Get full text
Final Year Project -
7
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
9
DC motor control using LQR algorithm
Published 2008“…A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. …”
Get full text
Get full text
Undergraduates Project Papers -
10
A parallel XTS encryption mode of operation
Published 2009“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This research aims are to develop an open-source Arduino based sEMG data acquisition device by formulating hybrid automata algorithm to differentiate MUAP activity during wheelchair propulsion. …”
Get full text
Get full text
Thesis -
12
Automated content sizing using accelerometer
Published 2014“…In this research, algorithm is developed to track the value changed in Z-axis when user moved the mobile device. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…These newly developed algorithms convert unmeasurable image to measureable image using image processing technique. …”
Get full text
Get full text
Thesis -
14
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now widely used in everyday appliances. …”
Get full text
Get full text
Thesis -
15
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
16
Development of auto-tracking mobile robot
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A genetic algorithm based student attendance management system with biometric identification / Mohammad Hanif Rashid
Published 2014“…Using a biometric device, together with our proposed system using Genetic Algorithm, it was shown that the method has achieved its objectives which helps in managing attendance recording process efficiently.…”
Get full text
Get full text
Thesis -
18
-
19
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…Then, the pixelated line segments are connected to form single/multiple contour loops using contour loop algorithm. The results of each algorithms are thoroughly evaluated. …”
Get full text
Get full text
Research Report -
20
Implementation of a parallel XTS encryption mode of operation
Published 2014“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article
