Search Results - (( java implementation rsa algorithm ) OR ( using complex data algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- data algorithm »
- rsa algorithm »
- using complex »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Damageless Digital Watermarking Using Complex-valued Artificial Neural Network
Published 2010“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Damageless digital watermarking using complex-valued artificial neural network
Published 2010“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
9
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
Published 2015“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Monograph -
10
Comparison study of sorting techniques in dynamic data structure
Published 2016“…The fastest algorithm is then determined by the estimated value for each sorting algorithm, which is computed using linear least square regression. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Comparison study of sorting techniques in dynamic data structure
Published 2016“…The fastest algorithm is then determined by the estimated value for each sorting algorithm, which is computed using linear least square regression. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Optimize the maximum flow of electricity capacity using Ford Fulkerson, Edmonds Karp and Goldberg Tarjan algorithm / Nik Nur Diyana Nik Mohd Huzaidi
Published 2024“…This research explores the optimization of electricity flow using the Ford Fulkerson, Edmonds Karp, and Goldberg Tarjan algorithms. …”
Get full text
Get full text
Thesis -
13
Performance Analysis of ARMA based Magnetic Resonance Imaging (MRI) Reconstruction Algorithm
Published 2012“…The proposed model coefficients determination in conjunction with various methods of optimal model order determination were then applied on MRI data using both Transient Error Reconstruction Algorithm (TERA) and modified Transient Error Reconstruction Algorithm to obtain images with improved resolution. …”
Get full text
Get full text
Monograph -
14
-
15
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
16
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…To investigate and capture the development of the pandemic, mapper algorithm can be used to visualize and analyse the COVID data set provided by the government. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Distortion-free embedding in the optic disk of retina fundus images using complex-valued neural network
Published 2011“…The novelty of the proposed algorithm is that it guarantees a complete recovery of the embedded data during watermark extraction provided the network is trained properly and correct weights are used. …”
Get full text
Get full text
Get full text
Article -
18
WCBP: A new water cycle based back propagation algorithm for data classification
Published 2016“…The back-propagation neural network (BPNN) algorithm performs well on many complex data types but it possess the problem of network stagnancy and local minima. …”
Get full text
Get full text
Article -
19
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
20
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…Adopting the medoid instead of the mean can enhance the efficiency. However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis
