Search Results - (( developing scheme using algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- developing scheme »
- using algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics
Published 2003“…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
Get full text
Get full text
Thesis -
7
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
8
Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models
Published 2013“…Accordingly, the study aimed to improve the hydroelectric power generation of the scheme. The genetic algorithm and the seasonally varied models have been developed to maximize the annual hydroelectric power generation of the Perak cascading reservoir. …”
Get full text
Get full text
Thesis -
9
-
10
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…A dynamic rate-based flow control (DRFC) scheme has been developed to support ABR service in unicast environment, while an adaptive feedback consolidation (AFC) algorithm has been designed for ABR multicasting. …”
Get full text
Get full text
Thesis -
11
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…The research goes on to compare the energy consumptions for encryption and decryption using the AAḃ AAp scheme with similar processes using the Textbook RSA scheme on the aforesaid embedded platforms. …”
Get full text
Get full text
Thesis -
12
-
13
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…Our main objective is to compute encryption process and develop decryption schemes using Mellin Transformation and to modify the basic El Gamal system with the application of Mellin-Kamal Transformation. …”
Get full text
Get full text
Student Project -
14
Development of robust control scheme for wheeled mobile robot in restricted environment
Published 2021“…A novel algorithm so called laser simulator logic (LSL) has been develo ped to estimate the inertia moment when the environment is noisy and cannot use fuzzy logic algorithm. …”
Get full text
Get full text
Thesis -
15
Development of novel distance relay scheme to prevent false tripping during power swing
Published 2017“…Another new detection scheme is also developed in this study for identifying the type of power swing. …”
Get full text
Get full text
Thesis -
16
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
17
A high-performance control scheme for photovoltaic pumping system under sudden irradiance and load changes
Published 2018“…In order to examine and assess the performance of the proposed control scheme for PV pumping system, a complete simulation model is developed using MATLAB/SimulinkTM environment and confirmed through real-time hardware in the loop (HIL) system. …”
Get full text
Get full text
Article -
18
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…According to the experimental results, the proposed algorithm improves PSNR with at least 5.4 compared to the previous schemes.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Multigrid solution of Euler equations using high-resolution NVD differencing scheme for unstructured meshes
Published 2023“…The efficiencies of the GAMMA scheme and its variant have been augmented with a novel agglomeration multigrid scheme to accelerate the convergence to steady state using the multi-stage Runge-Kutta time-marching technique. …”
Article -
20
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis
