Search Results - (( java implementation rsa algorithm ) OR ( program hand based algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- rsa algorithm »
- program hand »
- hand based »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Data-Glove-Based Hand Gesture Recognition System Using Flex Sensors And An Imu Sensor
Published 2017“…This system recognizes the hand gestures based on the information captured by the flex sensors and an IMU sensor. …”
Get full text
Get full text
Monograph -
8
3D hand posture recognition using multicam
Published 2011“…The availability of the distance data allows the hand posture to be recognized in z-axis direction without complex computational algorithms which also enables the program to work in real-time processing as well as eliminates the background effectively. …”
Get full text
Get full text
Conference or Workshop Item -
9
Agent-based extraction algorithm for computational problem solving
Published 2015“…On the other hand, agent-based model offers a good method to solve complex computational problems. …”
Get full text
Get full text
Thesis -
10
-
11
Collision prediction based genetic network programming-reinforcement learning for mobile robot navigation in unknown dynamic environments
Published 2017“…The problem of determining a smooth and collision-free path with maximum possible speed for a Mobile Robot (MR) which is chasing a moving target in a dynamic environment is addressed in this paper. Genetic Network Programming with Reinforcement Learning (GNP-RL) has several important features over other evolutionary algorithms such as it combines offline and online learning on the one hand, and it combines diversified and intensified search on the other hand, but it was used in solving the problem of MR navigation in static environment only. …”
Get full text
Get full text
Article -
12
Photo Based Walkthrough Using Prefetch and Caching Strategies
Published 2007“…Since actual photographs are used, the virtual environment can achieve unparalleled realism. On the other hand, geometry-based rendering system is very time consuming to be constructed especially for a large environment with complex lighting and visual effects. …”
Get full text
Get full text
Conference or Workshop Item -
13
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…This is because on one hand, the individual metrics deals with only a single feature of the object-oriented systems, while on the other hand; the suites either contain duplicate metrics of the same goal or lack some important metrics that match the common attributes in the software products. …”
Get full text
Get full text
Thesis -
14
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
Get full text
Get full text
Thesis -
15
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…Since programming is not very exact and can be considered partially art then the Genetic Algorithm is not designed to be fully autonomous and programmers hand still have to be there, but with much reduced work.…”
Get full text
Get full text
Research Report -
16
Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli
Published 2018“…In previous work, a 7-Degree Of Freedom (DOF) three fingered robot hand had been developed for a grasping task. The reference position of the robot hand however was programmed based on predetermined motor positions of the joints for grasping two different shapes of object. …”
Get full text
Get full text
Thesis -
17
Conference Approval System (e-CoAS) / Nor Hidayah Rahim
Published 2015Get full text
Get full text
Thesis -
18
Performance and evaluation of soft handover system towards WCDMA in 3G network / Norlia Ghazali
Published 2004“…Matlab is used as the programming language and to display the results.…”
Get full text
Get full text
Thesis -
19
SYSTEMATIC DESIGN OF SIMPLY STRUCTURED COMPENSATOR
Published 2005“…In this project, the algorithm of the tuning method based on Nyquist Stability Criterion is developed first. …”
Get full text
Get full text
Final Year Project -
20
Photo Based Walkthrough Using Prefetch and Caching Strategies
Published 2007“…Since actual photographs are used, the virtual environment can achieve unparalleled realism. On the other hand, geometry-based rendering system is very time consuming to be constructed especially for a large environment with complex lighting and visual effects. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
