Search Results - (( java implementation rsa algorithm ) OR ( program detection device algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…When these conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    INTERFACING CMOS CAMERA WITH ARM MICROCONTROLLER FOR SMALL ROBOTIC PLATFORM by HUSSIEN, MOHAMED MEERA

    Published 2013
    “…The robot follows the object according to the algorithm that had been programmed. The heart of the system is Raspberry Pi. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…When certain conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
    Get full text
    Get full text
    Article
  16. 16

    Sensor module for urban vehicle two way connection monitoring system/ Muhammad Ilyasaa Abdul Rahman by Abdul Rahman, Muhammad Ilyasaa

    Published 2015
    “…The project framework is divided into 2 main parts: living thing and impact detection. The sensing module will be interfaced with a microcontroller platform programmed with a set of algorithm. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Portable people counting application using MATLAB by Muhammad Na'im Farhan Mahamud

    Published 2023
    “…By using Viola-Jones algorithm as the base, a face detection program to count people can be build. …”
    text
  18. 18

    Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment by Kesavan Prabagaran, Premkumar

    Published 2017
    “…Due to the memory size increase drastically in the field programable gate array (FPGA) or system on chip (SOC) device, it become hard to meet the tests cost budget of the product especial for low-cost device. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…In recent years, several Android malware applications were developed to perform certain illegitimate activities and harmful actions on mobile devices. In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article