Search Results - (( java application rsa algorithm ) OR ( using combination from algorithm ))
Search alternatives:
- java application »
- combination from »
- application rsa »
- from algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus
Published 2000“…The results are obtained from the experiments that use the four rules and it combination. …”
Get full text
Get full text
Thesis -
7
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…Then, using these words in the experiment on the stemming algorithm is tested employing all the possible combination of affixes rules. …”
Get full text
Get full text
Thesis -
8
Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting
Published 2013“…These algorithms include equal�weights combination of Best NN models, combination of trimmed forecasts, combination through Variance-Covariance method and Bayesian Model Averaging. …”
Get full text
Get full text
Thesis -
9
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
10
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
11
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…This involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combinations and 3124 as the secondary. …”
Get full text
Get full text
Thesis -
12
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
13
-
14
A comparative study on testing optimization techniques with combinatorial interaction testing for optimizing software product line testing
Published 2025“…Each algorithm has been tested with different combinatorial interaction strengths from two to six. …”
Get full text
Get full text
Get full text
Article -
15
Combining data mining algorithm and object-based image analysis for detailed urban mapping of hyperspectral images
Published 2014“…The images were used to explore the combined performance of a data mining (DM) algorithm and object-based image analysis (OBIA). …”
Get full text
Get full text
Article -
16
Enhanced Algorithms By Combining Gauss-Seidel And Newton-Raphson In Load Flow Analysis
Published 2017“…Traditional load flow solution methods like Newton-Raphson has a great convergence characteristics with regards to its number of iterations and computing time, but suffers from poor convergence when used to solve ill-conditioned networks or if the starting initial values are far from solution. …”
Get full text
Get full text
Monograph -
17
Achieving security by combining Huffman and SLSB algorithms
Published 2013“…THE NEW ALGORITHM refers to a combined stenographic techniques; mainly Huffman algorithm and SLSB algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz
Published 2013“…Therefore, we proposed a shape recognition algorithm using similarity measurement combining Jaccard and Mahalanobis distance is used to measure the similarity between geometry shape sketches. …”
Get full text
Get full text
Thesis -
19
Controller placement mechanism in software defined network using k-median algorithm
Published 2016“…The second comparison was with the combinations results from considering the placement from specific nodes, and the results showed that it gives higher results than depending on the lowest values resulted from the k-median. …”
Get full text
Get full text
Get full text
Thesis -
20
To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi
Published 2000“…In which it involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combination and 2341 as the secondary. …”
Get full text
Get full text
Thesis
