Search Results - (( java based encryption algorithm ) OR ( basic computer data algorithm ))
Search alternatives:
- basic computer »
- data algorithm »
- computer data »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
Get full text
Get full text
Monograph -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
CSC645 - Algorithm Analysis and Design / College of Computing, Informatics and Media
Published 2022“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
11
CSC645: Algorithm Analysis and Design / College of Computing, Informatics and Mathematics
Published 2019“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
12
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…Students will be taught to solve problems involving the 5 basic algorithms of summation, average, counting, as well as determining the minimum and maximum values of a set of data. …”
Get full text
Get full text
Get full text
Teaching Resource -
13
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
14
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
15
A network based fetal ECG monitoring algorithm
Published 2011“…The hardware data acquisition system acquires the mother’s AECG data by using a commercial ECG frontend microchip, called CARDIC and stores the data in a local computer terminal. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…The computational results suggest that the AS approach embedded with heuristic(s) outperforms the pure AS algorithm. …”
Get full text
Get full text
Thesis -
18
System identification using Extended Kalman Filter
Published 2017Get full text
Get full text
Student Project -
19
Modifying iEclat algorithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
20
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item
