Search Results - (( java implementation rsa algorithm ) OR ( changes extraction path algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- changes extraction »
- extraction path »
- path algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm
Published 2019“…The ACO been chosen because of the positive feedback for rapid discovery and able to use in dynamic applications for example adapts to changes like new distances. The performance of the algorithm showed that the execution time of ACO is more realistic. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
Get full text
Get full text
Thesis -
8
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
9
-
10
Oil Palm Yield Data Collection Using Image Processing
Published 2021“…This area involves techniques such as path finding and stabilising in order to control the drone. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
WiFi-based human activity recognition through wall using deep learning
Published 2023“…The current focus of using WiFi Channel State Information (CSI) for human activity recognition (HAR) is the line-ofsight (LoS) path, which is mainly affected by human activities and is very sensitive to environmental changes. …”
Get full text
Get full text
Get full text
Get full text
Article
