Search Results - (( developing technology replication algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- technology replication »
- developing technology »
- replication algorithm »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
10
Study of hand gesture recognition using impulse radio ultra wideband (IRUWB) radar sensor
Published 2023“…Documentation of the development process ensures the methodology and findings are well-documented for reference and replication. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…The findings demonstrate that blockchain technology can play a crucial role in protecting cultural heritage, offering a replicable model for other traditional crafts facing similar challenges. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
Unlocking insights: A comprehensive dataset analysis on the acceptance of computational thinking skills among undergraduate university students through the lens of extended techno...
Published 2024“…Given the scarcity of research on technology acceptance in developing nations, this dataset holds particular significance, serving as a foundation for potential cross-cultural comparisons. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Parameters of Artificial Intelligence (AI) in Fatwa Issuance: A Jurisprudential and Technological Ethics Analysis
Published 2026journal::journal article -
18
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…Despite worldwide rapid development in 3D imaging technologies, documentation of 3D cultural assets in Malaysia is still very much reliant upon conventional techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…3D imaging technologies have undergone massive revolution in recent years. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
