Search Results - (( development library function algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A Stepper Motor Design Optimization Using by Wong, Chin Wei

    Published 2005
    “…This GAs library is a C++ library that contains tools and built-in components for using GAs to minimize the fitness function. …”
    Get full text
    Get full text
    Monograph
  8. 8
  9. 9

    Implementation and Optimization of Human Tracking System Using ARM Embedded Platform by Teoh, Shen Khang, Yap, Vooi Voon, Soh, Chit Siang, Sebastian , Patrick

    Published 2012
    “…Functions and library in OpenCV which developed by Intel Corporation was utilized for building the human tracking algorithms.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results by Fouziah Md Yassin, Ag Asri Ag Ibrahim, Zaturrawiah Ali Omar, Saturi Baco

    Published 2015
    “…One of the alternatives is by replacing it with cheaper adder and shifter to compute the same result. The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
    Get full text
    Get full text
    Research Report
  12. 12

    Augmented Reality Framework For Symbian Mobile Devices by Oui, Wei Wei

    Published 2013
    “…Computer vision and computer graphics concepts are applied in the development of the framework. Open source libraries such as OpenGL and OpenCV are used to develop mobile AR framework. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…By making two initially incompatible Python libraries interoperable, the web service enhanced the functionalities of lead management application module and car inventory application module with car price analytics and lead scoring analytics, respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno by Karno, Md Razib

    Published 2015
    “…Library has vastly developed and demand from the users, institutions, international organization needs and technology advancement has changed the library planning and decision making approach in many ways including library budgeting, human resource and infrastructure allocations. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…This research utilized several libraries in PyCharm, including NumPy, Rasterio, and Matplotlib. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A secure message handler using microsoft cryptoapi by Eh Kan, Chessda Uttraphan

    Published 2003
    “…A Visual Basic module called clsCiyptoAPI was developed to make calls to the advapi32.dll where the functions for the CryptoAPI reside. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A secure message handler using microsoft cryptoapi by Eh Kan, Chessda Uttraphan

    Published 2003
    “…A Visual Basic module called clsCiyptoAPI was developed to make calls to the advapi32.dll where the functions for the CryptoAPI reside. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20