Search Results - (( developing small techniques algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- developing small »
- small techniques »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Magnetic attitude control options for earth pointing small satellite
Published 2011“…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
Get full text
Get full text
Thesis -
7
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
8
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
9
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…There are 6 main designs that the algorithms proposed namely the Orthogonal-Diamond Search Algorithm with Small Diamond Search Pattern (ODS-SDSP), the Orthogonal-Diamond Search Algorithm with Large Diamond Search Pattern (ODS-LDSP), the Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (DOS-SDSP), the Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (DOS-LDSP), the Modified Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (MDOS-SDSP), and the Modified Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (MDOS-LDSP). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
11
Investigation of block matching algorithm for video coding
Published 2013“…Then, the best BMA algorithm technique will be chosen to develop a hybrid method that varies with the motion type of the video. …”
Get full text
Get full text
Get full text
Thesis -
12
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem
Published 2018“…Material and methods: To test the proposed technique, selected approximation algorithms have been developed to small graph instances. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
System identification of parameterized state-space model of a small scale UAV helicopter
Published 2012“…Prediction Error Modeling (PEM) algorithm has been identi�ed as an e�ective system identi�cation technique. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
15
Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique
Published 2012“…The optimizing of optimal path trace back system for Smith-Waterman algorithm using structural modelling techniques are presented in this paper. …”
Get full text
Get full text
Student Project -
16
The development of XML document retrieval using query weighting / Fauziah Mat Saat
Published 2005“…This research is focus on developing an XML documents retrieval using a query weighting algorithm in order to retrieve FTMSK official letter. …”
Get full text
Get full text
Thesis -
17
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Power system stabilization based on artificial intelligent techniques: a review
Published 2009“…These techniques are Artificial Neural Network (ANN), fuzzy logic, hybrid artificial intelligent, expert systems, and optimization techniques base AI such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Tabu Search (TS) algorithm, etc. …”
Get full text
Conference or Workshop Item -
19
Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems
Published 2024“…CTT can use small values for parameters P(0), Q, and R, so CKF was developed to overcome KF and other estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Maritime radar: a review on techniques for small vessels detection
Published 2019“…This paper presents a review of recent techniques in maritime radar, developed to overcome this issue, discussing several aspects such as (i) system topology, (ii) radar waveforms, and (iii) detection algorithms. …”
Get full text
Get full text
Get full text
Article
