Search Results - (( java implementation rsa algorithm ) OR ( after implementation cell algorithm ))
Search alternatives:
- after implementation »
- java implementation »
- implementation cell »
- implementation rsa »
- cell algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah
Published 1997“…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. The comparison between euler's path and Bipartite graph Algorithm [14] will be made at the end this of this report to see which one give optimal chaining .…”
Get full text
Get full text
Thesis -
7
New Contrast Enhancement Technique For Non-Uniform Illumination Digital Colour Medical Images
Published 2016“…After obtaining more even illumination cell images, this proposed algorithm addresses the low contrast problem by proposing new non-linear dark region bright region contrast enhancement techniques to enhance dark and bright regions individually. …”
Get full text
Get full text
Thesis -
8
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
9
-
10
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Classification of Parkinson's Disease (PD) Based on Multilayer Perception (MLPs) Neural Network and Anova as a feature extraction / Zahari Abu Bakar ... [et al.]
Published 2012“…Results attained confirmed that the LM performed well with accuracy rate of above 90% before and after feature selection whilst SSG attained above 85% subsequent to implementation of ANOVA as feature selection.…”
Get full text
Get full text
Thesis -
12
Classification of parkinson's disease (pd) based on multilayer perceptrons (MLPs) neural network and anova as a feature extraction / Zahari Abu Bakar ... [et al.]
Published 2012“…Results attained confirmed that the LM performed well with accuracy rate of above 90% before and after feature selection whilst SSG attained above 85% subsequent to implementation of ANOVA as feature selection.…”
Get full text
Get full text
Thesis
