Search Results - (( developing emerging implementation algorithm ) OR ( java applications rsa algorithm ))
Search alternatives:
- implementation algorithm »
- emerging implementation »
- developing emerging »
- java applications »
- applications rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
7
MBIST implementation and evaluation in FPGA based on low-complexity March algorithms
Published 2024“…They were implemented in the Intel Max 10 DE10-Lite FPGA Development Board. …”
Get full text
Get full text
Get full text
Article -
8
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
9
-
10
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Implementing Aproiri Algorithm for Predicting Result Analysis
Published 2013Get full text
Get full text
Article -
12
Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin
Published 2011“…This GPS will give the coordinates of latitude and longitude as well as the bearing angles between two positions. The algorithm of calculating the distance between these two positions also was developed by using PIC C Compiler. …”
Get full text
Get full text
Thesis -
13
Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…In response to the unprecedented challenges posed by the COVID-19 pandemic, this research project presents a systematic approach to outbreak prediction, specifically advocating for the implementation of Support Vector Machine (SVM) algorithms. …”
Get full text
Get full text
Thesis -
14
Implementing Aproiri Algorithm for Predicting Result Analysis
Published 2013Get full text
Get full text
Article -
15
-
16
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
Get full text
Get full text
Thesis -
17
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
18
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis -
19
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…As almost all finger vein recognition algorithms were implemented using software such as MATLAB which is based on general-purpose processor, the processing speed become the bottleneck of the development of finger vein recognition. …”
Get full text
Get full text
Thesis -
20
BLAZEBREAKER: GAMIFY THE FLAMES
Published 2024“…This final year project report explores the development and implementation of a Virtual Reality (VR) simulation aimed at enhancing fire drill safety and emergency preparedness, featuring a maze environment filled with intricate pipe structures that take place in a oil refinery. …”
Get full text
Get full text
Final Year Project
