Search Results - (( identification implementation developing algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- identification implementation »
- implementation developing »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of person identification application for video surveillance
Published 2022“…The information of the tracker is necessary for person identification. Third, person identification implemented the CNN model for training. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The process of development and implementation of DIS is carried out using MATLAB software and the image of the surface topography is then analysed to retrieve the results. …”
Get full text
Get full text
Thesis -
8
Implementation of Frequency Drift for Identification of Solar Radio Burst Type II
Published 2016“…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
11
Implementation of Frequency Drift for Identification of Solar Radio Burst Type II
Published 2016“…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
Get full text
Get full text
Article -
12
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…Several important issues in the identification process and real-time implementation of model predictive control algorithm are also discussed. …”
Get full text
Get full text
Thesis -
13
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…This project implements an iris recognition algorithm as a biometric identification. …”
Get full text
Get full text
Final Year Project -
14
Language identification system using Matlab: design, implementation, and sample codes
Published 2017“…This book investigates the development of language identification based on Mel-Frequency Cepstral Coefficients (MFCC) and Vector Quantization (VQ) algorithm. …”
Get full text
Get full text
Book -
15
-
16
-
17
Online fingerprint recognition
Published 2010“…For minutiae matching, the matching algorithm has been developed. This algorithm is capable of finding the correspondences between minutiae in the input image and store template. …”
Get full text
Get full text
Undergraduates Project Papers -
18
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
19
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…As almost all finger vein recognition algorithms were implemented using software such as MATLAB which is based on general-purpose processor, the processing speed become the bottleneck of the development of finger vein recognition. …”
Get full text
Get full text
Thesis -
20
Development of auto-tracking mobile robot
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item
