Search Results - (( java implementation rsa algorithm ) OR ( programmes problem based algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- programmes problem »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Agent-based extraction algorithm for computational problem solving
Published 2015“…On the other hand, agent-based model offers a good method to solve complex computational problems. …”
Get full text
Get full text
Thesis -
7
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…It has been shown that the performance of a graph-based shortest path algorithm can severely be affected by the performance of its priority queue. …”
Get full text
Get full text
Get full text
Thesis -
9
Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array
Published 2019“…There are many researches have been done to optimize PI controller based evolutionary algorithm, such as Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
10
-
11
Prediction of MUET result based on KNN algorithm / Siti Fatimah Azzahra Hamrizan
Published 2021“…The study aims to explore the K-Nearest Neighbour (KNN) algorithm in solving the MUET result prediction problem, to develop a prototype of MUET result prediction based on the KNN algorithm and to evaluate the accuracy of the KNN algorithm in MUET result prediction. …”
Get full text
Get full text
Thesis -
12
-
13
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…Therefore, ABC algorithm is proposed to solve the flowshop scheduling problem in this research. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…A distributed 5G-SDN-NFV-based network architecture uses the controller placement problem (CPP) to manage controller placement and number. …”
Get full text
Get full text
Thesis -
15
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
Get full text
Get full text
Thesis -
16
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…A fuzzy-based Naive Bayes algorithm has been used in this case. …”
Get full text
Get full text
Get full text
Thesis -
17
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…Such problem was faced by a multinational semiconductor manufacturer. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis
