Search Results - (( java implementation rsa algorithm ) OR ( programming programmes may algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…As a result, although customers may receive an excellent interactive features programme, the backend algorithm is not optimized. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Fast fourier transform processor implementation for high inputs on field programmable gates array by Ali Abbas, Zaid

    Published 2018
    “…Memory-based architecture chosen to use for FFT processors, due to the reduction in the number of butterflies and rotators, as they are reused for different stages of the FFT, were implemented on Cyclone II Field Programmable Gate Arrays (FPGA). Verilog Hardware Description Language (Verilog HDL) and VHDL Languages are used to program the algorithms into the FPGA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Design And Development Of Gas Argon Purging System by Ooi, Seng Yeong

    Published 2006
    “…Mircosoft Workgroup 3.11 operating system is used to transfer the AMPL programming to the PLC. 2 analogue signals and 4 digital signals are used in the program to manipulate the control system. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Ohka, Masahiro

    Published 2019
    “…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh by Mat Jusoh, Julia Ashazila

    Published 2020
    “…CNV analysis was performed using three independent algorithms: CNV partition v2.3.4, PennCNV and iPattern. …”
    Get full text
    Get full text
    Thesis
  13. 13