Search Results - (( java implementation rsa algorithm ) OR ( program using modern algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- modern algorithm »
- rsa algorithm »
- program using »
- using modern »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
Published 2006“…The way to solve this problem, we applied the existed method in visual C++ programming with used the Random midpoint Displacement (RMD) algorithm. …”
Get full text
Get full text
Student Project -
7
-
8
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…In this thesis, we implement the modified ant colony programming (ACP) algorithm for solving the matrix Riccati differential equation (MRDE). …”
Get full text
Get full text
Thesis -
9
-
10
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
11
-
12
Hydro thermal coordination using particle swarm optimization / Amirul Asraf Abd Latif
Published 2012“…Total generation must meet the demand of the power system. The algorithm is developed using MATLAB program and tested on a system comprising or the one thermal unit and one hydro unit. …”
Get full text
Get full text
Thesis -
13
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…Using less power, the proposed architecture is implemented based on python programming language, thereby improving time and power requirements compared to the traditional algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems
Published 2005“…To facilitate the implementation of these algorithms, a semi-automated computational tool using Matlab® programming facilities is developed. …”
Get full text
Get full text
Thesis -
15
Application of Multi-objective Genetic Algorithm (MOGA) optimization in machining processes
Published 2020“…The conventional methods for solving multi-objective problems consist of random searches, dynamic programming, and gradient methods whereas modern heuristic methods include cognitive paradigm as artificial neural networks, simulated annealing and Lagrangian approcehes. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
16
Solving economic load dispatch using immune evolutionary programming (IEP) optimization technique
Published 2024text::Final Year Project -
17
Analysis of image steganography using AES / Nur Amira Muhamad Ghazali
Published 2020“…Data hiding and encapsulation are both important concepts of Data hiding emphasizes so much on data protection and encapsulation emphasizes mostly on covering the complexity of the program. As our privacy is important in this modern world due to data stealing, both methods are widely used. …”
Get full text
Get full text
Thesis -
18
Analysis Of Human Detection Method In Social Distancing Monitoring
Published 2022“…Google Colaboratory is used as a programming platform with the use of Python programming language. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Design and implementation of fuzzy based controller for modern elevator group
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
20
Optimizing Visual Sensor Coverage Overlaps for Multiview Surveillance Systems
Published 2018“…The obtained solutions from the dynamic programming technique are evaluated with respect to local and global greedy search algorithms. …”
Get full text
Get full text
Article
