Search Results - (( java implementation rsa algorithm ) OR ( basic making based algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Interval-valued fuzzy soft topology and its applications in group decision-making problems
Published 2022“…In this thesis, we develop two multi algorithms based on the interval-valued fuzzy soft topology to overcome different situations in decision-making problems. …”
Get full text
Get full text
Thesis -
7
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…GDP forecasting is aided by the genetic algorithm radial basis neural network, which allows the government to make timely and effective macrocontrol plans based on the forecast trend of GDP in the region. …”
Get full text
Get full text
Article -
8
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…This is necessary since the present Bluetooth security has certain drawbacks in its implementation making it insecure. The use of digital signatures and trusted or certified public keys form the basic premise and approach in this work in providing stronger security for WPANs. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Augmented library (ARLIB)
Published 2018“…Augmented reality is a technology that works on computer vision based recognition algorithms to augment sound, video, graphics and other sensor based inputs on real world objects using the camera of your device. …”
Get full text
Get full text
Get full text
Book Section -
10
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…The algorithm is designed based on two basic works in which to calculate number of trees and divide an area into blocks. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
13
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
15
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…Images that capture using digital camera will perform through the algorithm to classified images. The methodology used in the development of this project is basically based on the eight major steps. …”
Get full text
Get full text
Thesis -
16
-
17
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…Significant modifications to the basic Jaya algorithm are done to create a modified Jaya (MJaya) algorithm that can handle the MOOPF problem. …”
Get full text
Get full text
Get full text
Article -
18
Stochastic process and tutorial of the African buffalo optimization
Published 2022“…It is our belief that elaborate manual description of the workings of optimization algorithms make it user-friendly and encourage reproducibility of the experimental procedures performed using this algorithm. …”
Get full text
Get full text
Get full text
Article -
19
-
20
