Search Results - (( java implementation rsa algorithm ) OR ( pattern perceptions detection algorithm ))
Search alternatives:
- java implementation »
- pattern perceptions »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Advancing literary analysis with Python: a comprehensive study of simile detection and classification in the translation of Al-Abrat
Published 2025“…Key findings reveal distinct patterns in simile usage, particularly the prevalence of perceptible-perceptible and cognitive-cognitive categories, emphasizing the role of figurative language in fostering thematic and emotional engagement. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Watermarking technique based on ISB (Intermediate Significant Bit)
Published 2010“…It inserts a perceptually transparent pattern called watermark in an image called host or cover using an embedding algorithm. …”
Get full text
Get full text
Proceeding Paper -
9
An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals
Published 2024“…To bridge this gap, this paper introduces a fingertip tracking system employing color marker detection algorithm to investigate the cognitive process of four totally blind participants associated with the Malaysian Association for The Blind (MAB). …”
Get full text
Get full text
Get full text
Article -
10
An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals
Published 2024“…To bridge this gap, this paper introduces a fingertip tracking system employing color marker detection algorithm to investigate the cognitive process of four totally blind participants associated with the Malaysian Association for The Blind (MAB). …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Permutation entropy based full-reference image quality qssessment
Published 2019“…Permutation entropy helps in detecting and visualizing changes related to structures with the correlation between successive samples instead of considering magnitudes of the signal, and since, perception of an image to the HVS changes more because of structural changes in an image rather than that of visible errors i.e. …”
Get full text
Get full text
Conference or Workshop Item
