Search Results - (( java implementation rsa algorithm ) OR ( using ((coding using) OR (reading using)) algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- rsa algorithm »
- reading using »
- coding using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity
Published 2018“…The proposed algorithm integrates the use of compression, multiplexing, and multilayer techniques in encoding and decoding the QR code. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Bar Code Detection Using Omnidirectional Vision for Automated Guided Vehicle Navigation
Published 2012“…Images from omnidirectional camera are known to be distorted against the height of the object. We present an algorithm for detecting and reading barcodes successfully without correcting the image distortion. …”
Get full text
Get full text
Conference or Workshop Item -
8
Chain coding and pre processing stages of handwritten character image file
Published 2010“…This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. …”
Get full text
Get full text
Get full text
Article -
9
Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi
Published 2021“…I have enhancing the QR-code steganography method by using LSB technique in RGB images and QR-code data input image pattern. …”
Get full text
Get full text
Student Project -
10
Real-time barcode reader using active vision
Published 2004“…An adaptive thresholding algorithm is used to reduce the effects of uneven illumination. …”
Get full text
Get full text
Thesis -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
12
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
Get full text
Get full text
Undergraduates Project Papers -
13
-
14
Protection of the texts using Base64 and MD5
Published 2012“…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
Get full text
Get full text
Get full text
Article -
15
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…In order to further validate the position of the tagging in the pallet box of the Random Forest model developed, a different predefined location was used to validate the model. The best position that could achieve a classification accuracy of 93.30% through the validation process for position five (5) in the systematic model that is the centre of the pallet box. …”
Get full text
Get full text
Thesis -
16
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
Get full text
Get full text
Get full text
Thesis -
17
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000“…This research presents a reverse engineering tool VOO++ that will read an Object- Oriented C++ source code using UML notation in order to visualise its Class structure and the various relationships that may exist including, inheritance, aggregation, and dependency relationships based on the modified Cohen-Sutherland clipping algorithm. …”
Get full text
Get full text
Thesis -
18
Design and evaluation of multidimensional turbo product coded MIMO-OFDM system
Published 2007“…The initial work is developing the dimensional-based reading order (DBRO) algorithm for generating the MDTPC codeword sequences. …”
Get full text
Get full text
Thesis -
19
A study on matrix factorization and its applications
Published 2021“…Computational steps are important as it serves the basic knowledge to code it in Python. Python also consists of libraries that can be used to calculate the approximated matrix with some parameter tuning. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis
