Search Results - (( initial visualization using algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- initial visualization »
- java application »
- using algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
CNN-SVO: improving the mapping in semi-direct visual odometry using single-image depth prediction
Published 2019Get full text
Get full text
Conference or Workshop Item -
7
Path planning for visually impaired people in an unfamiliar environment using particle swarm optimization
Published 2015“…Here, in this paper, we propose a path planning with predetermined waypoints method using Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Initialization procedure in solving Optimal Power Flow (OPF) using Artificial Immune System (AIS) optimization technique / Aimi Idzwan Tajudin
Published 2007“…The programmed that has been used in this project is MATLAB, which provides a high level computing language and interactive environment for algorithm development, data visualization, data analysis and numerical analysis. …”
Get full text
Get full text
Thesis -
9
Discretization of crack propagation on parallel computing: complexity and parallel algorithms with source code
Published 2010“…Parallel algorithm is used by Parallel Virtual Machine (PVM) software tool to capture the visualization of the overall extension and the stress distribution in a linearly tapered bar of circular section with an end load. …”
Get full text
Get full text
Get full text
Book -
10
Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code
Published 2010“…Parallel algorithm is used by Parallel Virtual Machine (PVM) software tool to capture the visualization of the overall extension and the stress distribution in a linearly tapered bar of circular section with an end load. …”
Get full text
Get full text
Get full text
Book Section -
11
Visualizing pathway on 3D maps for an interactive user navigation in mobile devices
Published 2019“…The Bi-A* path-finding algorithm was used for establishing dynamic target location in Voronoi diagram/Delaunay triangulation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
12
-
13
Car dealership web application
Published 2022“…Hence, two transfer learning algorithms were proposed and implemented to provide initial performance boost to the River adaptive random forest regressor and classifier, respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
-
16
An Approach to Derive Parametric L-System Using Genetic Algorithm
Published 2009Get full text
Get full text
Get full text
Book Section -
17
SLAMM: Visual monocular SLAM with continuous mapping using multiple maps
Published 2018Get full text
Get full text
Article -
18
Development of an efficient algorithm for fetal heart rate detection: a hardware approach
Published 2006“…The algorithm was initially developed and simulated in Visual C++. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…However, scalability limitations were observed in larger datasets, where visual clarity declined. These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability.…”
Get full text
Get full text
Get full text
Article -
20
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…Currently, visual inspections for damage identification of structures are broadly used. …”
Get full text
Get full text
Article
