Search Results - (( java implementation rsa algorithm ) OR ( point coding using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Line clipping based on parallelism approach and midpoint intersection by Hattab, Adel Salem Abdullah, Yusof, Yuhanis

    Published 2014
    “…In this algorithm there are no area codes to determine the position of end points of line.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…The data representation method employed was Freeman Chain Code (FCC). The fundamental issue with using FCC to represent a character is that the outcomes of the extractions depend on the starting points that changed the chain code's route length. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The network traffic transmission is effectively managed and prioritized using Quality of Service (QoS). The Differential Services Code Point within the Differentiated Service (DiffServ) field is primarily used inside the Layer 3 encapsulated network IP packets. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Direct Block Methods for Solving Special Second Order Ordinary Differential Equations and Their Parallel Implementations by Yap, Lee Ken

    Published 2008
    “…The performances of the r-point block methods using sequential and parallel codes are compared in terms of the total steps, execution time, speedup and efficiency. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Splitting algorithm is proposed to construct the new code families namely RD code. …”
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Improving ocraccuracy for scanned historical newspapers by Naiker, Nithyananthan

    Published 2013
    “…In this project, one variant of the chain code algorithm known as Compare images algorithm is presented when it has been tuned to process some samples of Sarawak Gazette. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    Performance Analysis of Hexagon-Diamond Search Algorithm for Motion Estimation using MATLAB by Abdul Manap, Redzuan, Ranjit, S.S.S.

    Published 2010
    “…One of ME techniques, known as Block Matching Algorithm (BMA), has been widely used in various video coding standards. …”
    Get full text
    Get full text
    Article
  16. 16

    Power improvement of solar photovoltaic (PV) based on maximum power point tracking (MPPT) controller / Siti Munirah Ahmad Saad by Siti Munirah, Ahmad Saad

    Published 2018
    “…This MPPT using perturb and observe algorithm, the algorithm are general algorithm and use as a code. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Performance Analysis of Motion Estimation Algorithms on Digital Video Images by Ali, Nur Alisa, Ja'afar, Abd Shukur, Abd Rahim, Rosman, Mohammed Napiah, Zul Atfyi Fauzan, Md Yusop, Azdiana, Meor Said, Maizatul Alice

    Published 2011
    “…An improvement on redundancy to achieve high compression ratio in video coding is developed. Block Matching Motion Estimation (BMME) techniques have been particularly used in various coding standards. …”
    Get full text
    Get full text
    Article
  18. 18

    Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA by Hussin, Fawnizu Azmadi, Mohd Nazlee, Anas, Zain Ali, Noohul Basheer

    Published 2010
    “…This research focuses on measuring the performance of CUDA and implementing CUDA for a scientific computation involving the process of porting the source code from CPU to GPU using direct integration technique. …”
    Get full text
    Get full text
    Article
  19. 19

    Super Calculator using Compute Unified Device Architecture (CUDA) by Nazlee, Anas Mohd

    Published 2009
    “…This research focuses on measuring the performance of CUDA and implementing CUDA for a scientific computation involving the process of porting the source code from CPU to GPU using direct integration technique. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Comparative study of secant, Fixed point and Sixth section methods for solving root in nonlinear equation / Nik Syahrul Naim Abdul Rahman by Abdul Rahman, Nik Syahrul Naim

    Published 2017
    “…Numerical analysis is to solve the functions for finding root by using a few numerical methods such as Secant, Fixed point and Sixth section methods to solve the functions for finding root. …”
    Get full text
    Get full text
    Thesis