Search Results - (( developing organizations tools algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing organizations »
- organizations tools »
- java application »
- tools algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…Thus, assigning highly correlated GO terms of annotated protein sequences to partially annotated or newly discovered protein sequences can be made. The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
7
SOMEA: self-organizing map based extraction algorithm for DNA motif identification with heterogeneous model
Published 2011“…Results: This paper aims to develop a Self-Organizing Map (SOM) based clustering algorithm for extracting binding sites in DNA sequences. …”
Get full text
Get full text
Get full text
Article -
8
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…This paper presents development of a new soft tissue analysis algorithm, which will be used as an analysis tool in Computer Assisted Craniofacial Surgery Planner – a surgery planning system under development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008“…Therefore, development of advanced algorithms for resolving this problem will be useful. …”
Get full text
Get full text
Get full text
Proceeding -
10
-
11
A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm
Published 2016“…Our proposed method has the potential to be used as an important tool in forecasting OPEC petroleum consumption to be used by OPEC authorities and other global oil-related organizations.This will facilitate proper monitoring and control of OPEC petroleum consumption.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
Evolutionary genetic algorithm as a generative tools in identifying Malay, Chinese and Indian cultural product DNA / Izzuddinazwan Misri
Published 2015“…This thesis presents an inquiry into the hybrid cross-cultural features of 3 majority races in Malaysia such the Malay, Chinese, and Indian using optimization tools called Genetic Algorithm in order to achieve new design DNA. …”
Get full text
Get full text
Thesis -
13
Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood
Published 2004“…This has led to an increased interest in developing methods that can help users to effectively navigate, summarize and organize this information with the ultimate goal of helping them to find what they are looking for. …”
Get full text
Get full text
Thesis -
14
-
15
Development of Low Cost Heart Rate Monitoring Device and Classification Technique Using Fuzzy Logics Algorithm
Published 2016Get full text
Get full text
Final Year Project -
16
Computed Tomography virtual lab software application in process tomography research
Published 2010Get full text
Working Paper -
17
Phishing attack detection using machine learning method
Published 2019“…The goal of this study is to apply anti-phishing tools in preventing the network security attack in an organization. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
An efficient and accurate numerical simulation method for the paint curing process in auto industries
Published 2009Get full text
Working Paper -
19
-
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
