Search Results - (( java implementation rsa algorithm ) OR ( causing problems faced algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- causing problems »
- faced algorithm »
- problems faced »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Tolerable Constructive Graph-Based Hyper-Heuristic Algorithm For Examination Timetabling
Published 2009“…Examination Timetabling Problem (ETTP) is an NP-hard typical optimization problem faced by institutions and universities across the world. …”
Get full text
Get full text
Thesis -
7
-
8
ENGINEERING DESIGN WITH PSO ALGORITHM
Published 2019“…This creates such problems and one of the root causes is the amount variables used by design engineers. …”
Get full text
Get full text
Final Year Project -
9
Development Of An Algorithm To Reduce The Topographical Effects In Reflected Radiance
Published 2020“…Topographic effects in satellite images are not errors but distortions caused by the solar and surface geometry. Surfaces facing towards the Sun tend to be brighter while surfaces facing away from the Sun are generally darker. …”
Get full text
Get full text
Thesis -
10
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…For most face recognition algorithms, partial occlusions affect the performance of the algorithm. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Also, Most image scrambling algorithms apply one iteration level scrambling that cause a high possibility of occurs the weakness of visual leakage on the image scrambling algorithm which can be reflected by the corresponding scrambled image. …”
Get full text
Get full text
Get full text
Article -
14
Attendance management system with half-covered and full-facial recognition feature
Published 2023“…However, following the outbreak of pandemic COVID-19, we are strongly advised to always put on a face mask to protect ourselves and others. This practice has caused problems to existing attendance management system with facial recognition. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Ultrasonic parking sensors using triangulation algorithm / Mohamad Syahzmeer Mohamed Sufian
Published 2019“…The main cause of this problem is the vehicle's inherent blindspot that the drivers have to face during a reversing maneuver and also the innacuraccy of the parking sensors in measuring the distance accurately. …”
Get full text
Get full text
Student Project -
16
Least congested channel recommendation for uncoordinated WiFi access point / Ag Ibrahim Ag Daud
Published 2017“…These access points can cause signal interference between access points if the selected channel are the same or overlapping. …”
Get full text
Get full text
Thesis -
17
An adaptive face recognition under constrained environment for smartphone database
Published 2018“…Finally, this study aims to obtain high-accuracy face recognition performance under the uncontrolled environment of a smartphone database based on the proposed adaptive face recognition method that combines two new face recognition algorithms. …”
Get full text
Get full text
Thesis -
18
Face recognition for varying illumination and different optical zoom using a combination of binary and geometric features
Published 2020“…In addition, various length of face-to-camera distance gives significant problem affect for the performance of face recognition method. …”
Get full text
Get full text
Get full text
Article -
19
Reinforcement learning based techniques in uncertain environments: problems and solutions
Published 2015“…The paper discusses important issues faced by RL in unknown and unstructured environments. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing
Published 2023“…Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). …”
Article
