Search Results - (( development library function algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- function algorithm »
- library function »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
7
A Stepper Motor Design Optimization Using
Published 2005“…This GAs library is a C++ library that contains tools and built-in components for using GAs to minimize the fitness function. …”
Get full text
Get full text
Monograph -
8
Development of an efficient algorithm for fetal heart rate detection: a hardware approach
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
9
Implementation and Optimization of Human Tracking System Using ARM Embedded Platform
Published 2012“…Functions and library in OpenCV which developed by Intel Corporation was utilized for building the human tracking algorithms.…”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…One of the alternatives is by replacing it with cheaper adder and shifter to compute the same result. The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
12
Augmented Reality Framework For Symbian Mobile Devices
Published 2013“…Computer vision and computer graphics concepts are applied in the development of the framework. Open source libraries such as OpenGL and OpenCV are used to develop mobile AR framework. …”
Get full text
Get full text
Thesis -
13
Car dealership web application
Published 2022“…By making two initially incompatible Python libraries interoperable, the web service enhanced the functionalities of lead management application module and car inventory application module with car price analytics and lead scoring analytics, respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…Library has vastly developed and demand from the users, institutions, international organization needs and technology advancement has changed the library planning and decision making approach in many ways including library budgeting, human resource and infrastructure allocations. …”
Get full text
Get full text
Thesis -
15
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…This research utilized several libraries in PyCharm, including NumPy, Rasterio, and Matplotlib. …”
Get full text
Get full text
Student Project -
16
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
17
-
18
A secure message handler using microsoft cryptoapi
Published 2003“…A Visual Basic module called clsCiyptoAPI was developed to make calls to the advapi32.dll where the functions for the CryptoAPI reside. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A secure message handler using microsoft cryptoapi
Published 2003“…A Visual Basic module called clsCiyptoAPI was developed to make calls to the advapi32.dll where the functions for the CryptoAPI reside. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
