Search Results - (( java implementation rsa algorithm ) OR ( process application using algorithm ))
Search alternatives:
- java implementation »
- process application »
- implementation rsa »
- using algorithm »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Recursive least square and fuzzy modelling using genetic algorithm for process control application
Published 2007“…A technique for the modelling of nonlinear process control using Recursive Least Square and Takagi-Sugeno Fuzzy System with Genetic Algorithm topology is described. …”
Get full text
Get full text
Conference or Workshop Item -
8
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
9
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
10
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
11
-
12
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
13
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The algorithm may be developed for application in other field that uses greyscale image as well.…”
Get full text
Get full text
Monograph -
14
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…The scope of the project is to implement the original Porter Stemming Algorithm in the application to improved the precision and recall in the retrieving document process. …”
Get full text
Get full text
Final Year Project -
15
Fire Detection Algorithm using Image Processing Techniques
Published 2015“…The algorithm uses RGB colour model to detect the colour of the fire which is mainly comprehended by the intensity of the component R which is red colour. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
17
Design of a flexible digital baseband signal processing algorithm
Published 2006“…The work presented in this paper is aimed at designing a flexible digital baseband signal processing algorithm (DBSP) for satellite applications. …”
Get full text
Get full text
Conference or Workshop Item -
18
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Development of novel algorithm features in the modelling of cyclic processes
Published 2002“…In principle, the algorithm could be used for many cyclic process. Air separation using rapid pressure swing adsorption (RPSA) is used as an illustration. …”
Get full text
Get full text
Get full text
Article -
20
Estimation in spot welding parameters using genetic algorithm
Published 2007“…By using Genetic algorithm (GA) the spot welding parameters can be estimated.…”
Get full text
Get full text
Thesis
