Search Results - (( development process function algorithm ) OR ( java public encryption algorithm ))
Search alternatives:
- function algorithm »
- public encryption »
- process function »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
2
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
3
Challenges of hidden data in the unused area two within executable files
Published 2009“…Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). …”
Get full text
Get full text
Get full text
Article -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
7
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
9
Effort Estimation Model for Function Point Measurement
Published 2007“…Various cost estimation models and methods are available to be used for software development process. The COCOMO, an algorithmic model is one example. …”
Get full text
Get full text
Thesis -
10
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…CAPP functions as the recognizer of the geometric input from CAD and analyse it into specific function for manufacturing purpose in CAM. …”
Get full text
Get full text
Thesis -
11
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
Get full text
Get full text
Thesis -
12
Computer control of batch process plant (software development)
Published 1995“…The algorithm has been successful tested using the Non-interacting Liquid Level Control of Three lank System plant models transfer function.…”
Get full text
Get full text
Student Project -
13
A block cipher based on genetic algorithm
Published 2016“…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
Get full text
Get full text
Get full text
Thesis -
14
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
15
Hybrid artificial immune system-genetic algorithm optimization based on mathematical test functions
Published 2023“…The hybrid includes two processes; firstly, AIS is the attraction among the researchers as the algorithm. …”
Conference paper -
16
-
17
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…A series of algorithms in solving the inverse problem were then developed corresponding to the forward models. …”
Get full text
Get full text
Thesis -
18
A refined differential evolution algorithm for improving the performance of optimization process
Published 2011“…Among the latest Evaluation Algorithm (EA) have been developed is Differential Evolution (DE). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…The developed method also demonstrated the effectiveness of the multi-criteria decision-making process when compared with the multi-objective evolutionary algorithm (MOEA). …”
Get full text
Get full text
Article -
20
A video-rate color image segmentation using adaptive and statistical membership function
Published 2010“…Typically, the image segmentation algorithms in video processing system require very high computation power, so it is desirable to develop algorithms for implementation as a real-time system. …”
Get full text
Get full text
Get full text
Article
