Search Results - (( java implementation rsa algorithm ) OR ( _ application processing algorithm ))
Search alternatives:
- application processing »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This review emphasizes the effects and consumption of different algorithms in different image processing applications. …”
Get full text
Get full text
Get full text
Article -
7
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
8
-
9
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
10
Recursive least square and fuzzy modelling using genetic algorithm for process control application
Published 2007“…A technique for the modelling of nonlinear process control using Recursive Least Square and Takagi-Sugeno Fuzzy System with Genetic Algorithm topology is described. …”
Get full text
Get full text
Conference or Workshop Item -
11
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…However, the bottle neck is efficient scheduling algorithms. Such complex applications can be expressed in the form of workflows. …”
Get full text
Get full text
Get full text
Thesis -
12
Design of a flexible digital baseband signal processing algorithm
Published 2006“…The work presented in this paper is aimed at designing a flexible digital baseband signal processing algorithm (DBSP) for satellite applications. …”
Get full text
Get full text
Conference or Workshop Item -
13
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
14
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
15
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
16
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The IoT (mobile) devices that generate these data are limited in terms of processing capacity and energy, because of these limitations of the mobile devices, they cannot process all generated tasks in the IoT application environment. …”
Get full text
Get full text
Thesis -
17
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The algorithms to be developed will consist of pre-processing, enhancement and image segmentation. …”
Get full text
Get full text
Monograph -
18
-
19
-
20
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
