Search Results - (( java implementation rsa algorithm ) OR ( basic implementation during algorithm ))
Search alternatives:
- implementation during »
- basic implementation »
- java implementation »
- implementation rsa »
- during algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…In this project we will propose encryption algorithm which offer less computational complexity and also provide securing data not only during transmission but also during storage. …”
Get full text
Get full text
Final Year Project -
7
Autonomous path planning robot using geographical information
Published 2008“…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
Get full text
Learning Object -
8
Optimization-based method for estimating the transmission rate of COVID-19 during the lockdown in Malaysia
Published 2022“…During the Conditional MCO and Recovery MCO, the basic reproduction number was slightly decreased to an average R0 value less than 1. …”
Get full text
Get full text
Article -
9
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…The technique utilizes the narrow phase approach in detecting collision detection of non-convex object by testing collision between basic primitive and polygon. This algorithm is implemented in a virtual flexible manufacturing cell for the loading and unloading process performed by the robot. …”
Get full text
Get full text
Thesis -
10
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
11
OPTIMIZATION-BASED METHOD FOR ESTIMATING THE TRANSMISSION RATE OF COVID-19 DURING THE LOCKDOWN IN MALAYSIA
Published 2023“…During the Conditional MCO and Recovery MCO, the basic reproduction number was slightly decreased to an average R0 value less than 1. …”
Article -
12
Development of airbag suit system for motorcyclist
Published 2014Get full text
Get full text
Get full text
Article -
13
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis -
14
Mobile Robot with Navigation Control and Communication
Published 2016“…The robot is designed to implement the project in the study of autonomous navigation and path planning. …”
Get full text
Get full text
Final Year Project -
15
Bundle Sorting Mobile Application
Published 2020“…There are many advantages when the apparel industry implemented image processing during sorting the garments product to obtain the accurate quantity in the production line. …”
Get full text
Get full text
Final Year Project -
16
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim
Published 2014“…The improvised GDAis able to reduce computer running time as compared to previous algorithm and able to deals with a sparse graph. Implementation of the algorithm to graphical FACS model of CFB shows that it is able to better explained the combustion process in terms of depletion species over time t and important species which denotes as by-product of the combustion is shown to be in accordance to the real process. …”
Get full text
Get full text
Thesis -
18
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…Subsequently, a computer algorithm and interfacing tool is developed. The tool enables any personal with basic computer literacy and access to the tool and data file to process the data and asses the HKP of the flight at ease. …”
Get full text
Get full text
Get full text
Thesis -
19
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…During the implementation testing, the functionality and usability of the website assurance application have been verified by different level of computing expert users. …”
Get full text
Get full text
Get full text
Article -
20
A new 128-bit block cipher
Published 2009“…This block cipher uses only basic operations, key dependent S-box and XOR IS together so that it can be efficiently implemented on various platforms. …”
Get full text
Get full text
Thesis
