Search Results - (( java implementation rsa algorithm ) OR ( program realization based algorithm ))
Search alternatives:
- java implementation »
- program realization »
- implementation rsa »
- realization based »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A novel N-input voting algorithm for X-by-wire fault-tolerant systems
Published 2014“…These systems include N-modular redundant (NMR) hardware systems and diversely designed software systems based on N-version programming (NVP). Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Synthesis and optimization of multilevel refrigeration systems using generalized disjunctive programming
Published 2022“…Shaft work savings of up to 12.3 are obtained from the model results against the base case. Preliminary estimations show that cost savings of up to 2.55 MM/y are realizable against the base case. …”
Get full text
Get full text
Article -
9
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The proposed embedded system has achieved positive outcomes in comparison to the current system and the traditional algorithm with regards to the shortest path. The results show a range of 8.3% to 26.8% improvement in the proposed path compared to the traditional Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
11
Motor control system development using microcontroller based on PID controller
Published 2014“…PID controllers which are one of the algorithms that can adjust the input values based on historical data and the emergence rate of differences, in order to make the system more accurate and stable. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Finite Element Modeling Of Ballistic Penetration into Fabric Armor
Published 2006“…This program (named DYNTEX) based on the mentioned algorithm is designed using MATLAB code. …”
Get full text
Get full text
Thesis -
13
A study on the efficiency of the object model for a dynamic feedback mechanism in network simulator 2 (NS-2) / Nor Adora Endut, Rozianawaty Osman and Noorazida Mohd Idris
Published 2008“…With CORBA having the overall view of the programming realm as individual objects allowing for interoperability, it offers the possibility to observe NS procedures and algorithms as objects and allow for a remote CORBA client to access these objects to be operated on without the direct access to the NS core itself. …”
Get full text
Get full text
Research Reports -
14
Measuring Enterprise Architecture / Siti Fatimah Azzahra Ibrahim
Published 2016Get full text
Get full text
Thesis -
15
Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application
Published 2019“…In most cases, the position controllers rarely utilize geometrical drawing such as CAD/CAM trajectory as input reference without extensive programming or trajectory generation algorithm. Thus, this thesis aims to integrate directly the trajectory in G-code form of *.txt format as input reference for the position controller algorithm designed in MATLAB/Simulink via development of a system interpreter. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…UGVs are widely used for mission-based applications that are often hazardous or inconvenient for humankind. …”
Get full text
Get full text
Monograph
