Search Results - (( java implementation rsa algorithm ) OR ( basic integration a algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- basic integration »
- rsa algorithm »
- integration a »
- a algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method
Published 2018“…Power integrity of a design plays an important role in affecting the signal integrity and the overall performance of the design. …”
Get full text
Get full text
Monograph -
7
-
8
-
9
A review of navigation systems (integration and algorithms)
Published 2009Get full text
Get full text
Get full text
Article -
10
-
11
Algorithmic implementation to achieve high speed mathematical addition on Silicon for 128 bits and larger
Published 2009Get full text
Working Paper -
12
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
13
Integrated pyranometer for photovoltaic module measurement
Published 2013“…This project presents the development of a handheld pyranometer which is integrated with temperature sensor modules using the application of Microcontroller PIC16F877A. …”
Get full text
Get full text
Student Project -
14
Integrated pyranometer for photovoltaic module measurement: article
Published 2013“…This paper presents the development of a handheld pyranometer which is integrated with temperature sensor modules using the application of Microcontroller PIC16F877A. …”
Get full text
Get full text
Article -
15
Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles
Published 2023“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article -
16
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem
Published 2023“…The original ABC algorithm has a better exploration approach while the ARO algorithm has a better exploitation strategy when approaching the optimum value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Secondly, the research shifts to the problems of point-to-multipoint algorithms by introducing the basic concept of multicasting ABR servIce and reviewing a group of consolidation schemes, where the compromise between low consolidation nOlse and fast transient response is the main issue. …”
Get full text
Get full text
Thesis -
19
Integrating fuzzy logic and brute force algorithm in optimizing Energy Management Systems for Battery Electric Vehicles
Published 2024“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article -
20
