Search Results - (( java implementation rsa algorithm ) OR ( parameters content based algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- parameters content »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…Through the proposed algorithm, the Minimum Contention Window (CWmin) and Arbitration Inter Frame Space (AIFS) parameters were adapted based on the percentage of the collision in the network. …”
Get full text
Get full text
Get full text
Thesis -
7
Efficient back-off mechanism for multimedia support in IEEE 802.11E
Published 2012“…This research attempts to look into ways to produce an effective back-off mechanism that is adaptive dynamically to the network status and able to support QoS for realtime applications over wireless ad-hoc networks based on the IEEE 802.11e standard. The current research proposes a new algorithm so-called Dynamic Fast Adaptation of back-off algorithm for contention-based EDCA (DFA-EDCA) mechanism. …”
Get full text
Get full text
Thesis -
8
Video abstraction using density-based clustering algorithm
Published 2017“…The novelty of DbSva is (a) to integrate the advantages of both the global and local features of video contents by fusion and (b) to employ the DENsity-based CLUstEring algorithm (DENCLUE) to significantly improve the quality of abstract videos. …”
Get full text
Get full text
Get full text
Article -
9
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…In this study, a fully online density-based clustering algorithm called Buffer-based Online Clustering for Evolving Data Stream (BOCEDS) is presented. …”
Get full text
Get full text
Thesis -
10
-
11
PID Parameters Improvement for AGC in Three Parallel-Connected Power Systems
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A matlab-based graphical user interface (GUI) to predict the food quality during frying process
Published 2022“…The colour and moisture content were evaluated based on two parameters of French fries, which were oil temperature (150℃,170℃ and 190℃) and sample thickness (5mm,10mm and 15mm) during deep frying. …”
Get full text
Thesis -
13
Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e
Published 2016“…Enhanced Distributed Channel Access (EDCA) is a fundamental and mandatory contention-based channel access method of IEEE 802.11e which delivers traffic based on differentiated Access Category (ACs). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The performance of FESSIC was evaluated against ten benchmark image classification algorithms and six classifiers on four ground-based sky image datasets. …”
Get full text
Get full text
Get full text
Thesis -
15
A New Hybrid Gravitational Search- Black Hole Algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks
Published 2014“…EBA-15.4MAC is designed based on two new techniques; firstly, it updates the contention window size based on the probability of collision parameter. …”
Get full text
Get full text
Article -
17
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…It can reconstruct images with five distortion types, outperforming SOTA AS algorithms, even under high distortion. The first stage uses an application-specific reconstruction algorithm, while the second stage employs an IQA-based model called the observation-based bilateral filter (OBF) with non-linear weights calculated using a Haar-PSI-based maximum a posteriori (MAP) estimator. …”
Get full text
Thesis -
18
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…EBA-15.4MAC is based on two new important techniques; firstly, it updates he contention window size based on the probability of collision parameter. …”
Get full text
Get full text
Thesis -
19
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…The acquired results have proven that the proposed algorithms have successfully enhanced the legacy hybrid and the deadline based algorithm.…”
Get full text
Get full text
Thesis -
20
