Search Results - (( java implementation rsa algorithm ) OR ( using ((test using) OR (code using)) algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- rsa algorithm »
- code using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph -
7
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…The objectives of this research are to design a fuzzy encoder algorithm to handle the size limitation and static colour problems, to design a fuzzy decoder algorithm to cater for the success rate, speed and static colour issues and to test the algorithms using two different datasets from Yang et al. (2018) and the colour QR codes generated by the proposed FQR code encoder. …”
Get full text
Get full text
Thesis -
8
Steganography algorithm to hide secret message inside an image
Published 2011“…The proposed algorithm uses binary codes and pixels inside an image. …”
Get full text
Get full text
Article -
9
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
Study of optimal EG placement in radial distribution system using real coded genetic algorithm
Published 2011“…RCGA is a method that uses continuous floating numbers as representation which is different from conventional GA which is using binary numbers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
12
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
13
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
14
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…The experimental results showed that CrashDroid, which employs the technique considering the code complexity of the action and the use of context data during the test, was more effective than the other automated Android testing tool, AutoDroid, which did not consider the mentioned metrics.…”
Get full text
Get full text
Get full text
Thesis -
15
A Real-Coded Dynamic Genetic Algorithm For Optimizing Driver’s Model In Emission Test Cycle
Published 2015“…The algorithm is evaluated using two driving cycle data; Japan’s 10-15 mode cycle and Europe’s NEDC. …”
Get full text
Get full text
Get full text
Article -
16
PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES
Published 2008“…A reduced size or errors from previous is used in the algorithm. A graph similar to the theoretical BER vs SNR is obtained for both interleaved and non-interleaved BCH codes. …”
Get full text
Get full text
Final Year Project -
17
Automatic marking system for programming subject
Published 2023“…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing
Published 2022“…Then, the algorithm will be tested whether it can be extended up to 5D printing by using three different types of models with a different printing process. …”
Get full text
Get full text
Monograph -
19
Online Programming Judge System (UOJ)
Published 2013“…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. …”
Get full text
Get full text
Final Year Project -
20
Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm
Published 2003“…This paper discusses part of the process involved in translating the sketch or irregular line drawing into a tidy or regular line drawing, that yield three important entities namely junction, line and region. The chain code algorithm is used to find these entities. The paper also explains explicit thinning process involved before the chain code methodology. …”
Get full text
Get full text
Get full text
Article
