Search Results - (( developing interface perception algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The application of Hough Transform for corner detection by Jamaludin, Mohad Fuad

    Published 2006
    “…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. To illustrate the problem, the interface program is developed by using Microsoft Visual C++ 6.0.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The perception of ensuring security is expensive in terms of computation, power and user-interface components because of low-power IoT objects or sensor nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    The design for antrophomorphic sociable agent interaction through emotion detection by Ab. Aziz, Azizi, Siraj, Fadzilah, Sainin, Mohd Shamrie, Mohd Hassin, Mohd Hafiz

    Published 2003
    “…Thus, it will give a new direction of human-computer interaction issues in designing the most suitable interface that can understand our behaviour and respond to it Scope of Presentation: Artificial Intelligence, Cognitive Science, Affective Computing, and Human-Computer Interaction.…”
    Get full text
    Get full text
    Conference or Workshop Item