Search Results - (( java implementation rsa algorithm ) OR ( based data conversion algorithm ))
Search alternatives:
- conversion algorithm »
- java implementation »
- implementation rsa »
- data conversion »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Competitive algorithms for online conversion problems with interrelated prices
Published 2019“…The classical uni-directional conversion algorithms are based on the assumption that prices are arbitrarily chosen from the fixed price interval[m, M] where m and M represent the estimated lower and upper bounds of possible prices 0<m<M. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
8
DNA approach for password conversion generator
Published 2014“…This proposed algorithm is able to securing the data or information at least 3 levels of combinations for the password conversion.…”
Get full text
Get full text
Conference or Workshop Item -
9
Hybrid shear-warp rendering
Published 1999“…With the zlist-buffer, an object-based scan conversion of polygons requires only a simple modification of the standard polygon scan-conversion algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
Get full text
Get full text
Thesis -
11
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
12
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…This study also aims to develop an algorithm that uses conversion of greyscale image into RGB as an approach to image processing for greyscale image. …”
Get full text
Get full text
Monograph -
13
-
14
Embodied conversational agents for H5N1 pandemic crisis
Published 2007“…A Crisis Communication Network, called CCNet, is established based on a novel algorithm incorporating natural language query and embodied conversation agent simultaneously. …”
Get full text
Get full text
Get full text
Article -
15
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Weka, a data mining tool, provides the facility to classify the data set with different machine learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Development of drift conversion algorithm for ISFET based pH sensor for continuous measurement system
Published 2018Get full text
Get full text
Research Report -
17
The new efficient and accurate attribute-oriented clustering algorithms for categorical data
Published 2012“…Many algorithms for clustering categorical data have been proposed, in which attribute-oriented hierarchical divisive clustering algorithm Min-Min Roughness (MMR) has the highest efficiency among these algorithms with low clustering accuracy, conversely, genetic clustering algorithm Genetic-Average Normalized Mutual Information (G-ANMI) has the highest clustering accuracy among these algorithms with low clustering efficiency. …”
Get full text
Get full text
Thesis -
18
A hybrid P-graph and WEKA approach in decision-making: waste conversion technologies selection
Published 2022“…Then, using the WEKA software, the data from the feasible structure would be processed and evaluated using the chosen algorithm. …”
Get full text
Get full text
Article -
19
Estimation of non-contact smartphone video-based vital sign monitoring using filtering and standard color conversion techniques
Published 2018“…In this paper, vital signs are estimated using smartphone device based video camera imaging technique. The standard color conversion technique and Plane-Orthogonal-to-Skin (POS) algorithm have been applied to estimate the Remote photoplethysmography (rPPG) signal efficiently. …”
Get full text
Get full text
Article -
20
Optimization of emulsion polymerization of styrene and methyl methacrylate (MMA)
Published 2013“…Using gPROMS, the system analyzed the data, created models, developed algorithms, manipulated and plotted based on the functions and data. …”
Get full text
Get full text
Undergraduates Project Papers
