Search Results - (( java implementation rsa algorithm ) OR ( programming computing acs algorithm ))
Search alternatives:
- programming computing »
- java implementation »
- implementation rsa »
- rsa algorithm »
- computing acs »
- acs algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Modelling and simulation of hysteresis control algorithm for use in single phase ac-to-ac matrix converter / Seri Iryani Mohd Noor
Published 2003“…This thesis is illustrated by developing computer simulation models of ac-to-ac single phase matrix converter (SPMC) using sinusoidal pulse width modulation (SPWM) technique and another algorithm i.e hysteresis control technique. …”
Get full text
Get full text
Thesis -
7
-
8
A method for group formation using genetic algorithm
Published 2010Get full text
Get full text
Get full text
Article -
9
-
10
-
11
-
12
-
13
Rationale of students' failure in comprehending theoretical computer science courses
Published 2014Get full text
Get full text
Conference or Workshop Item -
14
Accuracy of advanced deep learning with tensorflow and keras for classifying teeth developmental stages in digital panoramic imaging
Published 2022“…Results: Image segmentation using the DP-AC algorithm enhanced the visibility of the image features in the region of interest while suppressing the image’s background noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
-
18
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…The AnkPlex web server is freely accessible at http://ankplex.ams.cmu.ac.th.…”
Get full text
Get full text
Article -
19
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…Performance assessment of CISOS in finding the global minimum point of the test have revealed superior performance in terms of global minimum point found by CISOS as well as the computational time required to find the point. The proposed CISOS algorithm is subsequently employed to solve the allocation of Flexible AC Transmission System (FACTS) devices for the purpose of multi-objective voltage security problem. …”
Get full text
Get full text
Thesis -
20
Computational intelligence based technique for congestion management and compensation scheme in power system / Nur Zahirah Mohd Ali
Published 2019“…CEPSO integrates the element of cloning and swarm in the original Evolutionary Programming algorithm. CEPSO is initially used to optimize the location and sizing of FACTS devices for compensation scheme. …”
Get full text
Get full text
Thesis
