Search Results - (( developing integration rsa algorithm ) OR ( java visualization learning algorithm ))
Search alternatives:
- developing integration »
- visualization learning »
- java visualization »
- learning algorithm »
- integration rsa »
- rsa algorithm »
-
1
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
2
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
3
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
4
-
5
A study of watermarking methods in medical application
Published 2004“…These three methods that being studied are better for integrity control. Meanwhile, a Graphic User Interface (GUI) is developed for embedding and extracting purpose. …”
Get full text
Get full text
Thesis -
6
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
7
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…The use of digital signatures and trusted or certified public keys form the basic premise and approach in this work in providing stronger security for WPANs. Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…Random Sequential Adsorption (RSA) is integrated with quaternion mathematics to achieve dense, yet random, fiber packing. …”
Get full text
Get full text
Get full text
Article -
11
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article
