Search Results - (( java implementation rsa algorithm ) OR ( basic data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- java implementation »
- implementation rsa »
- data normalization »
- rsa algorithm »
- basic data »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…Clustering is basically one of the major sources of primary data mining tools, which make researchers understand the natural grouping of attributes in datasets. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
9
-
10
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Agent-based extraction algorithm for computational problem solving
Published 2015“…The basic statistical frequency method was used to analyse the performance result. …”
Get full text
Get full text
Thesis -
13
Dynamic traffic light flow control system using on-road sensor technology / Mohamed Irfan
Published 2017“…The controller uses Traffic Light Signal Manipulation Algorithm (TLSMA) to dynamically change in the traffic signals by using the data generated by the sensors. …”
Get full text
Get full text
Get full text
Thesis -
14
A Review on the Development of Indonesian Sign Language Recognition System
Published 2013“…However, communication with normal people is a major handicap for them since normal people do not understand their sign language. …”
Get full text
Get full text
Get full text
Article -
15
Students Activity Recognition By Heart Rate Monitoring In Classroom Using K-means Classification
Published 2024Get full text
journal::journal article -
16
Machine learning as new approach for predicting of maxillary sinus volume, a sexual dimorphic study
Published 2023“…In this retrospective study, we used data from 150 patients with normal maxillary sinuses to train and evaluate a Python ML algorithm for its ability to predict MSV from basic patient demographics (age, gender) and sinus length measurements in three directions (anteroposterior, mediolateral, and superoinferior). …”
Get full text
Get full text
Get full text
Article -
17
Robust Kernel Density Function Estimation
Published 2010“…The results of the study indicate that the proposed methods are capable of labelling normal observation and potential outliers in a data set. …”
Get full text
Get full text
Thesis -
18
Extention and cryptanalysis of golden cryptography
Published 2015“…On the other hand, the encryption algorithm of GC is more suitable for textual data and cannot be directly applied to images. …”
Get full text
Get full text
Thesis -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia
Published 2021“…It is also an indispensable basic information for local land management departments in land use planning and management. …”
Get full text
Get full text
Get full text
Article
