Search Results - (( developing general normalization algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- normalization algorithm »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research
Published 2013Get full text
Get full text
Get full text
Non-Citation Index Journal -
9
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
10
AUTONOMOUS POWER LINE INSPECTION USING COMPUTER VISION
Published 2022Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image
Published 2016“…Generally, the highest accuracy is produced using RF feature selection (97.53%), hence, describe the efficiency of RF algorithm for feature selection task using field spectroscopy data. …”
Get full text
Get full text
Thesis -
12
-
13
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…This paper outlines an alternative algorithm for solving general second order ordinary differential equations (ODEs). …”
Get full text
Get full text
Get full text
Article -
14
Fault diagnostic algorithm for precut fractionation column
Published 2004Get full text
Get full text
Conference or Workshop Item -
15
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
Get full text
Get full text
Final Year Project -
16
Numerical algorithm of block method for general second order ODEs using variable step size
Published 2017“…This paper outlines an alternative algorithm for solving general second order ordinary differential equations (ODEs). …”
Get full text
Get full text
Get full text
Article -
17
Novel techniques for enhancement and segmentation of acne vulgaris lesions
Published 2013Get full text
Get full text
Get full text
Citation Index Journal -
18
General algorithms for 3-D motion of a non-planar body in a steady-state force field
Published 2002“…Herein we compare the two methods in terms of efficiency and accuracy. Due to their general nature, the algorithms may be readily coded to meet the needs of many applications…”
Get full text
Get full text
Article -
19
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011Get full text
Get full text
Journal -
20
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. The latter is developed using an adapted algorithm of Hejhal and Then which is based on implicit automorphy and finite Fourier series. …”
Get full text
Get full text
Thesis
