Search Results - (( java implementation rsa algorithm ) OR ( knowledge visualization detection algorithm ))
Search alternatives:
- knowledge visualization »
- visualization detection »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
7
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
8
Parallel visualization approach of a 3D heart model
Published 2008Get full text
Get full text
Conference or Workshop Item -
9
Computer vision for zoo animals using YOLO algorithm / Muaz Wazir
Published 2022Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
Get full text
Get full text
Get full text
Thesis -
18
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
19
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The above mentioned problems are the motivation of this research; where it is vital to propose a security alert framework using dynamic tweet-based features for phishing detection on Twitter. This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
20
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
Get full text
Get full text
Get full text
Thesis
