Search Results - (( developing program rsa algorithm ) OR ( java data collection algorithm ))
Search alternatives:
- collection algorithm »
- developing program »
- rsa algorithm »
- program rsa »
- java »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
3
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
5
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
6
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
7
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Thesis -
8
-
9
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Get full text
Thesis -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. …”
Get full text
Get full text
Monograph -
12
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. …”
Get full text
Get full text
Get full text
Article -
13
Human activity recognition via accelerometer and gyro sensors
Published 2023“…Lastly, the project paves the way for establishment of standardized dataset, with streamlined data collection, data annotation and data storage, and allow comparative research and benchmarking.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…These cognitive maps are then stored in a data warehouse and ready to collect anytime for analytics purposes. …”
Get full text
Get full text
Thesis -
15
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…The second-level learner uses logistic regression (LR) to aggregate the final prediction output. The landslide data together with its conditioning factors (feature variables) collected from three districts in the Central Java Province, Indonesia, has been used as the case study for the LSM. …”
Conference Paper -
16
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. …”
Get full text
Get full text
Get full text
Article -
17
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise
