Search Results - (( java implementation rsa algorithm ) OR ( point coding using algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using algorithm »
- rsa algorithm »
- point coding »
- coding using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Line clipping based on parallelism approach and midpoint intersection
Published 2014“…In this algorithm there are no area codes to determine the position of end points of line.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition
Published 2023“…The data representation method employed was Freeman Chain Code (FCC). The fundamental issue with using FCC to represent a character is that the outcomes of the extractions depend on the starting points that changed the chain code's route length. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…The network traffic transmission is effectively managed and prioritized using Quality of Service (QoS). The Differential Services Code Point within the Differentiated Service (DiffServ) field is primarily used inside the Layer 3 encapsulated network IP packets. …”
Get full text
Get full text
Get full text
Article -
10
Direct Block Methods for Solving Special Second Order Ordinary Differential Equations and Their Parallel Implementations
Published 2008“…The performances of the r-point block methods using sequential and parallel codes are compared in terms of the total steps, execution time, speedup and efficiency. …”
Get full text
Get full text
Thesis -
11
Development of new code for optical code division multiple access systems
Published 2011“…Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
12
-
13
-
14
Improving ocraccuracy for scanned historical newspapers
Published 2013“…In this project, one variant of the chain code algorithm known as Compare images algorithm is presented when it has been tuned to process some samples of Sarawak Gazette. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Performance Analysis of Hexagon-Diamond Search Algorithm for Motion Estimation using MATLAB
Published 2010“…One of ME techniques, known as Block Matching Algorithm (BMA), has been widely used in various video coding standards. …”
Get full text
Get full text
Article -
16
Power improvement of solar photovoltaic (PV) based on maximum power point tracking (MPPT) controller / Siti Munirah Ahmad Saad
Published 2018“…This MPPT using perturb and observe algorithm, the algorithm are general algorithm and use as a code. …”
Get full text
Get full text
Get full text
Thesis -
17
Performance Analysis of Motion Estimation Algorithms on Digital Video Images
Published 2011“…An improvement on redundancy to achieve high compression ratio in video coding is developed. Block Matching Motion Estimation (BMME) techniques have been particularly used in various coding standards. …”
Get full text
Get full text
Article -
18
Tranformation of CPU-based Applications To Leverage on Graphics Processors using CUDA
Published 2010“…This research focuses on measuring the performance of CUDA and implementing CUDA for a scientific computation involving the process of porting the source code from CPU to GPU using direct integration technique. …”
Get full text
Get full text
Article -
19
Super Calculator using Compute Unified Device Architecture (CUDA)
Published 2009“…This research focuses on measuring the performance of CUDA and implementing CUDA for a scientific computation involving the process of porting the source code from CPU to GPU using direct integration technique. …”
Get full text
Get full text
Final Year Project -
20
Comparative study of secant, Fixed point and Sixth section methods for solving root in nonlinear equation / Nik Syahrul Naim Abdul Rahman
Published 2017“…Numerical analysis is to solve the functions for finding root by using a few numerical methods such as Secant, Fixed point and Sixth section methods to solve the functions for finding root. …”
Get full text
Get full text
Thesis
