Search Results - (( java implementation rsa algorithm ) OR ( basic using cloud algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- cloud algorithm »
- rsa algorithm »
- basic using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…The provision of resources and services for scientific workflow applications using a multi-cloud architecture and a pay-per-use rule has recently gained popularity within the cloud computing research domain. …”
Get full text
Get full text
Article -
7
Comparative study on job scheduling using priority rule and machine learning
Published 2021“…Implementation of a suitable scheduling algorithm is critical in order to properly use cloud resources. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. …”
Get full text
Get full text
Thesis -
9
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…After using the RANSAC algorithm to remove the map ground, the European clustering algorithm is used for point cloud segmentation. …”
Get full text
Get full text
Get full text
Article -
10
On uniform traffic pattern of symmetric midimew connected mesh network
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
11
Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia
Published 2021“…This study can act as a reference to effectively improve the land use mapping in cloud-prone tropical regions.…”
Get full text
Get full text
Get full text
Article -
12
Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques
Published 2021“…In the next step, noise and roof errors were removed using KNN filter and a new network was created and re-evaluated based on the shortest distance in the LiDAR point cloud to create an integrated DTM. …”
Get full text
Get full text
Get full text
Thesis -
13
Campus study buddy : collaborative learning and resource sharing app
Published 2024“…The final deliverable of the project is an Android mobile application that integrates Google Cloud and Google Firebase while providing basic functions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
