Search Results - (( java implementation rsa algorithm ) OR ( program detection device algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- program detection »
- device algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
Get full text
Get full text
Conference or Workshop Item -
7
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
8
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
9
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Subjects:Article -
10
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
11
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
12
-
13
Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus
Published 2015“…When these conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
Get full text
Get full text
Thesis -
14
INTERFACING CMOS CAMERA WITH ARM MICROCONTROLLER FOR SMALL ROBOTIC PLATFORM
Published 2013“…The robot follows the object according to the algorithm that had been programmed. The heart of the system is Raspberry Pi. …”
Get full text
Get full text
Final Year Project -
15
Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus
Published 2015“…When certain conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
Get full text
Get full text
Article -
16
Sensor module for urban vehicle two way connection monitoring system/ Muhammad Ilyasaa Abdul Rahman
Published 2015“…The project framework is divided into 2 main parts: living thing and impact detection. The sensing module will be interfaced with a microcontroller platform programmed with a set of algorithm. …”
Get full text
Get full text
Student Project -
17
Portable people counting application using MATLAB
Published 2023“…By using Viola-Jones algorithm as the base, a face detection program to count people can be build. …”
text -
18
Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment
Published 2017“…Due to the memory size increase drastically in the field programable gate array (FPGA) or system on chip (SOC) device, it become hard to meet the tests cost budget of the product especial for low-cost device. …”
Get full text
Get full text
Thesis -
19
-
20
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In recent years, several Android malware applications were developed to perform certain illegitimate activities and harmful actions on mobile devices. In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article
