Search Results - (( java implementation rsa algorithm ) OR ( using code using (algorithmic OR algorithms) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity by Azizi, Abas

    Published 2018
    “…The proposed algorithm integrates the use of compression, multiplexing, and multilayer techniques in encoding and decoding the QR code. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…The algorithm is based on chain-coded image, deriving the slope between each code, analyze the series of chain code, and finally decide the existence of corner at the current pixel location. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A new dynamic code assignment algorithm for joint CDMA and SDMA system by Odeh, Nidhal A. S., Khatun, Sabira, Ismail, Alyani, Mohd Ali, Borhanuddin

    Published 2008
    “…This article describes an optimal dynamic code assignment algorithm, which can be used to maximize the total number of users in combined C-SDMA system with minimum required quality of service (QoS) and limited number of codes. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode by Abas, Azizi, Yusof, Yuhanis, Ahmad, Farzana Kabir

    Published 2017
    “…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20