Search Results - (( java implementation rsa algorithm ) OR ( program data detection algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- data detection »
- rsa algorithm »
- program data »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…This certainly needs further considerations on characteristics of the erroneous data. Thus, a post-processing program was developed to detect and discard the MBES far outliers based on behaviours of propagated beam in the multibeam sonar system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. The results show the algorithm's impressive performance with an 86% precision in predicting ASD traits. …”
Get full text
Get full text
Thesis -
8
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…However, every single tool has different ways of detection and accuracy of the detection. This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
10
-
11
-
12
-
13
-
14
Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi
Published 2022“…This problem occurs due to lacking of existing system in detecting children image in a car. Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. …”
Get full text
Get full text
Thesis -
15
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
16
-
17
Adaptive algorithms for automated intruder detection in surveillance networks
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Then flock optimization algorithm is applied to detect the sequence; this process is used to reduce the convergence and optimization problems. …”
Get full text
Get full text
Article -
20
