Search Results - (( java implementation rsa algorithm ) OR ( using ((coding using) OR (making using)) algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fast algorithm for VQ-based wavelet coding system by Khalifa, Othman Omran

    Published 2003
    “…In this paper, a modified version of (Linde-Buzo-Gray)LBG algorithm using Partial Search Partial Distortion (PSPD) is presented for coding the wavelet coefficients. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  9. 9

    ADAPTIVE MODULATION AND CODING FOR WIMAX SYSTEMS by MAJAVU, WABO

    Published 2006
    “…Fixed transmission systems make use of average modulation and coding which has reasonable performance in both high and low SNR conditions in the communication channel. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Speech coding for Bluetooth with CVSD algorithm by Khalifa, Othman Omran, Khan, Sheroz, Islam, Md. Rafiqul, Muktar, Mohd, Yaacob, Zahrein

    Published 2004
    “…Speech coding is performed using numerous steps or operations specified as an algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  12. 12

    The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman. by Abdul Rahman, Husna, S. Abdul Kadir, Ros Shilawani, Abdul Rahman, Farah Yasmin

    Published 2007
    “…The decoding based on soft bits are referred to as soft decision decoding. The algorithm uses soft decision information to rank the reliability of the received symbols. …”
    Get full text
    Get full text
    Research Reports
  13. 13
  14. 14
  15. 15

    Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi by Mohd Alwi, Muhammad Danial

    Published 2021
    “…I have enhancing the QR-code steganography method by using LSB technique in RGB images and QR-code data input image pattern. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP by Talib Alshammari, Wissam

    Published 2012
    “…This thesis implements LPC-10 analysis and synthesis using Matlab and C coding. LPC-10 have been compared with some other speech compression algorithms like pulse code modulation (PCM), differential pulse code modulation (DPCM), and code excited linear prediction coding (CELP), in term of segmental signal to quantization noise ratio SEG-SQNR and mean squared error MSE using Matlab simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18µm CMOS technology: article by Marzuki, Nurul Hidayah, Saparon, Azilah

    Published 2009
    “…The use of Coordinate Rotation Digital Computer (CORDIC) in the source code make it provides an area-efficient architecture for effective design at Silterra 0.18µm CMOS technology.…”
    Get full text
    Get full text
    Article
  18. 18

    Implementation of sinusoidal pulse width modulation based on cordic algorithm using silterra 0.18um CMOS technology / Nurul Hidayah Marzuki by Marzuki, Nurul Hidayah

    Published 2009
    “…The use of Coordinate Rotation Digital Computer (CORDIC) in the source code make it provides an area-efficient architecture for effective design at Silterra 0.18um CMOS technology.…”
    Get full text
    Get full text
    Thesis
  19. 19

    The development of virtual product life cycle design tool using artificial intelligence technique by Harun, Habibollah, Ismail @ Ishak, Hasrul Haidar, Sukimin, Zuraini

    Published 2008
    “…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
    Get full text
    Monograph
  20. 20

    Autonomous Robot Navigation in Unknown Maze Environment by Nur Aqilah binti Mustafa, Nur Aqilah

    Published 2012
    “…The result of the chosen algorithm then is compared to Wall Following algorithm, a typical algorithm used to solve obstacle avoidance maze. …”
    Get full text
    Get full text
    Final Year Project