Search Results - (( java implementation rsa algorithm ) OR ( after implementation cell algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Synthesis of transistor chaining algorithm for CMOS cell layout using euler path / Sukri Hanafiah by Hanafiah, Sukri

    Published 1997
    “…The euler's path it using pseudo input and Heuristic algorithm to find the minimum interlace. The comparison between euler's path and Bipartite graph Algorithm [14] will be made at the end this of this report to see which one give optimal chaining .…”
    Get full text
    Get full text
    Thesis
  7. 7

    New Contrast Enhancement Technique For Non-Uniform Illumination Digital Colour Medical Images by Eng , Sheh Ling

    Published 2016
    “…After obtaining more even illumination cell images, this proposed algorithm addresses the low contrast problem by proposing new non-linear dark region bright region contrast enhancement techniques to enhance dark and bright regions individually. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Classification of Parkinson's Disease (PD) Based on Multilayer Perception (MLPs) Neural Network and Anova as a feature extraction / Zahari Abu Bakar ... [et al.] by Abu Bakar, Zahari, Ibrahim, Nur Farahiah, Ispawi, Dzufi Iszura, Md. Tahir, Nooritawati

    Published 2012
    “…Results attained confirmed that the LM performed well with accuracy rate of above 90% before and after feature selection whilst SSG attained above 85% subsequent to implementation of ANOVA as feature selection.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Classification of parkinson's disease (pd) based on multilayer perceptrons (MLPs) neural network and anova as a feature extraction / Zahari Abu Bakar ... [et al.] by Abu Bakar, Zahari, Ibrahim, Nur Farahiah, Ispawi, Dzufi Iszura, Md. Tahir, Nooritawati

    Published 2012
    “…Results attained confirmed that the LM performed well with accuracy rate of above 90% before and after feature selection whilst SSG attained above 85% subsequent to implementation of ANOVA as feature selection.…”
    Get full text
    Get full text
    Thesis