Search Results - (( development programme during algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- programme during »
- during algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
RISC-V instruction set extension on blockchain application
Published 2024“…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Develpoment of combinatorial optimisation for cutting tool path strategy
Published 2009“…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
Get full text
Get full text
Conference or Workshop Item -
9
Prioritisation Assessment and Robust Predictive System for Medical Equipment: A Comprehensive Strategic Maintenance Management
Published 2024journal::journal article -
10
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…A two-stage heuristic algorithm is proposed to solve the multi-location timetabling problem on MSc HRD coursework programme. …”
Get full text
Get full text
Get full text
Thesis -
11
An experimental validation and optimisation tool path strategy for thin walled structure
Published 2011“…The target was to develop models which mimic the actual cutting process using the finite element method (FEM), to validate the developed tool path strategy algorithm with the actual machining process and to programme the developed algorithm into the software. …”
Get full text
Get full text
Get full text
Article -
12
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The findings from this research can be used by system developer or computer programmer to search the optimum sequence during the manufacturing process and improve the flowshop scheduling.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…Within this era of technology, privacy and confidentiality are the essential considerations to be addressed as a result of the exponential development of the Internet. One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Logic modeling and mathematical model in developing a tree species selection prototype
Published 2014“…Logic modeling and mathematical model can aid system analysts, system developers and programmers to construct a system during a system development process. …”
Get full text
Get full text
Get full text
Article -
15
A cluster analysis of population based cancer registry in Brunei Darussalam : an exploratory study
Published 2022“…The top three prevalent cancers associated with these subgroups were consistently identified using the three algorithms. Upon comparing the subgroups’ ages during diagnosis, we identify possible screening behaviours of specific subgroups, suggesting for early screening awareness programmes. …”
Get full text
Get full text
Get full text
Article -
16
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…The village assistance programme can motivate and engage rural communities during the participatory and transparent phase of village development. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…During data transfer, HMAC is critical for message authentication. …”
Get full text
Get full text
Get full text
Article -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…During data transfer, HMAC is critical for message authentication. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
