Search Results - (( java implementation rsa algorithm ) OR ( basic using self algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- self algorithm »
- rsa algorithm »
- basic using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Data Analysis using Particle Swarm Optimization Algorithm
Published 2015Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
8
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
9
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
10
Deterministic Automatic Test Pattern Generation for Built-In Self Test System
Published 2006“…To illustrate that, the DATPG algorithm for digital combinational circuit using VHDL language is designed to generate the test patterns. …”
Get full text
Get full text
Thesis -
11
-
12
Fractal coding of bio-metric image for face authentication
Published 2021“…Fractal geometry is looking for self-similarity, self-similarity resonance, and self-similarity convergence. …”
Get full text
Get full text
Thesis -
13
Disposable Biomimetic Array Sensor Strip Coupled With Chemometric Algorithm For Quality Assessment Of Orthosiphon Stamineus Benth Samples
Published 2006“…A disposable screen printed array sensor strip based on self-plasticized methacrylate acrylate PVC blend lipid membranes combined with chemometric algorithm has been developed and applied for qualitative and quantitative analysis of O.stamineus samples. …”
Get full text
Get full text
Thesis -
14
ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING
Published 2020“…Hence, this paper contribute to justify by the basic concepts of data mining, described the selected types and models of algorithms, and the process of data mining by using R Tools.…”
Get full text
Get full text
Final Year Project -
15
Computer aided interactive pressure vessel design
Published 2008“…Software Microsoft Visual Basic 6.0 is used for the purpose of building the interactive interfaces and processing the data. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Transtheoretical model of change for weight control in Malaysian context
Published 2010“…The findings of this study indicated that the basic constructs of the TIM: the Stages of Change, the Decisional Balance, the Self-Efficacy, and the integration between the Stages of Change, and the Decisional Balance, Stages of Change and the SelfEfficacy variables were generalizable to the study population. …”
Get full text
Get full text
Get full text
Thesis -
17
Determining Suitable Program For SPM Holder Using Neural Network Approach
Published 2002“…The basic architecture are multilayer feedforward networks, trained using the Backpropagation algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Web Camera Application For Motion Detection
Published 2003“…In the third stage, implementation process is done by coding the motion detection software using Microsoft Visual Basic 6.0. The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
19
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…The form-finding procedure involves method of solving the system of equilibrium equations through the use of Moore-Penrose generalized inverse, determination of self-equilibrium stress modes via eigenvector basis decomposition and optimization of coefficients for the linear combination of linearly independent selfequilibrium stress modes. …”
Get full text
Get full text
Thesis -
20
Earth observation micro-satellite design optimization using satellite simulator / Robertus Heru Triharjanto … [et al.]
Published 2016“…It is also find that due to full acces level, the self-made simulator as used in the research has good potential to be used in the optimization case with search algorithm.…”
Get full text
Get full text
Get full text
Article
