Search Results - (( java implementation rsa algorithm ) OR ( filing program learning algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- learning algorithm »
- program learning »
- filing program »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019Get full text
Get full text
Get full text
Proceeding Paper -
7
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…Among Information Technology graduates, Java programming assignments is an essential part of learning programming as it trains the student to solve programming assignments so that they can improve their programming skills that is useful in their professional life after graduation. …”
Get full text
Get full text
Get full text
Thesis -
8
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…MapReduce is a promising parallel programming model for processing large data. Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
Get full text
Get full text
Get full text
Article -
9
The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim
Published 2006“…The system is capable of accepting any type of loaded data file and input parameters chosen by the user. The system also provides a user-friendly attributes to be used by unfamiliar MATLAB programming language user.…”
Get full text
Get full text
Research Reports -
10
-
11
-
12
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
13
Customer sentiment analysis through social media feedback: A case study on telecommunication company
Published 2022“…The data were then split into training and testing to be tested on the three different supervised learning algorithms used in this study which are Support Vector Machine, Random Forest, and Naïve Bayes. …”
Get full text
Get full text
Get full text
Article -
14
Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module
Published 2001“…The code has been developed using Object-Oriented Programming Language and Graphic User Interface. The developed control algorithms enable the user to control the mobile robot manually, automatically or by voice recognition commands. …”
Get full text
Get full text
Thesis -
15
Customer sentiment analysis through social media feedback
Published 2022“…The data were then split into training and testing to be tested on the three different supervised learning algorithms used in this study which are Support Vector Machine, Random Forest, and Naïve Bayes. …”
Get full text
Get full text
Undergraduates Project Papers -
16
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
17
