Search Results - (( developing integration rsa algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- developing integration »
- java segmentation »
- integration rsa »
- using algorithm »
- rsa algorithm »
-
1
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
2
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
5
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
6
-
7
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
A study of watermarking methods in medical application
Published 2004“…These three methods that being studied are better for integrity control. Meanwhile, a Graphic User Interface (GUI) is developed for embedding and extracting purpose. …”
Get full text
Get full text
Thesis -
9
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…The use of digital signatures and trusted or certified public keys form the basic premise and approach in this work in providing stronger security for WPANs. Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…Random Sequential Adsorption (RSA) is integrated with quaternion mathematics to achieve dense, yet random, fiber packing. …”
Get full text
Get full text
Get full text
Article
