Search Results - (( developing using factor algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- developing using »
- factor algorithm »
- rsa algorithm »
- using factor »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
An Information Retrieval Algorithm to Extract Influential Factors
Published 2012“…The aim of the study is to develop an algorithm that can extract a minimum set of factors that can be used to assess companies’ performances. …”
Get full text
Get full text
Get full text
Thesis -
7
Investigating Inclusion of Safety Metrics for Safe Route Determination on Pedestrian Map
Published 2011“…To develop the safest route algorithm, it is important to research on the appropriate safety metrics that will be used to develop the safest route algorithm. …”
Get full text
Get full text
Final Year Project -
8
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
A Study And Development Of Digital Control Technique For Power Factor Correction Using Pre-Calculated Algorithm With A Low Cost 8-Bit Microcontroller
Published 2013“…A digital control technique for power factor correction using pre-calculated algorithm with a low cost 8-bit microcontroller is studied and presented in this paper. …”
Get full text
Get full text
Thesis -
10
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people
Published 2004“…Further research is seeking to develop the program further and to identify further risk factors for all-cause mortality in older people.…”
Get full text
Get full text
Get full text
Article -
11
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…This thesis also aims to solve the low-carbon LIRP model with uncertainty factors such as carbon trading, customer demand, shortages, and soft time windows using advanced algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. …”
Get full text
Get full text
Final Year Project -
13
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
14
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
15
Generalized Triad Design Algorithms
Published 2012“…Previous studies on TD(v) reported its existence when v≡1 or 5 (mod 6) and TD(7) was developed by using a brute-force method. In this study, generalized and new algorithms for developing TD(v) for any v = 6n + 1 or v = 6n + 5 were developed. …”
Get full text
Get full text
Thesis -
16
Hevea leaf features extraction and recognition algorithm for hevea clones classification using image / Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib
Published 2013“…As a result Wu et al. [1] was successful developed an efficient algorithm for the plant classification. 32 kinds of plants have been classified by using the algorithm. …”
Get full text
Get full text
Research Reports -
17
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
Get full text
Get full text
Thesis -
18
Performance comparison of LFXLMS, MOVFXLMS and THF-NLFXLMS algorithms for Hammerstein NANC
Published 2016“…When using optimum leakage factors, these algorithms show close performance with benchmark nonlinear FXLMS (NLFXLMS) algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
19
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…Many face detection models have been developed in smart entryways using IoT. However, there is a lack of IoT development on face mask detection. …”
Get full text
Get full text
Get full text
Article -
20
Reducing Iteration Using Candidate List
Published 2008“…Their ability as a colony to find paths or routes to the food sources has inspired a newly developed algorithm called Dynamic Ant Colony System 3 Level Updates (DACS3). …”
Get full text
Get full text
Conference or Workshop Item
