Search Results - (( java application rsa algorithm ) OR ( sequence identification task algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Enhancement of cell visibility and contrast for fluorescence microscope images by subjective and objective analysis of several visual aspects by Mkayes, A.A., Walter, N., Saad, N.M., Faye, I., Cheong, S.C., Lim, K.P.

    Published 2017
    “…Enhancement and de-noising of images remain challenging tasks and imperative steps for image analysis algorithms. …”
    Get full text
    Get full text
    Article
  8. 8

    Problem Solving by Yahaya, Azizi

    Published 2010
    “…Additionally in solving ill-structured problems, people may need to use more than a heuristic or an algorithmic strategy; insight may be required. The problems to be solve ant the tasks to be accomplished are challenging. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Detection And Identification Of Stiction In Control Valves Based On Fuzzy Clustering Method by Daneshwar, Muhammad Amin

    Published 2016
    “…Not only has the identification time been decreased to less than a second (i.e. average is 0.4505 seconds), the performance of the proposed methods of stiction detection, diagnosis and identification has also been confirmed by both simulation and industrial data. …”
    Get full text
    Get full text
    Thesis