Search Results - (( java implementation rsa algorithm ) OR ( using consequences using algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using consequences »
- consequences using »
- using algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Optimization of fuzzy model using genetic algorithm for process control application
Published 2011“…This paper discusses the identification of the parameters at the antecedent and consequent parts of the fuzzy model. For the antecedent fuzzy parameters, genetic algorithm is used to tune them while at the consequent part, recursive least squares approach is used to identify the system parameters. …”
Get full text
Get full text
Article -
7
On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models
Published 2009“…This can be accomplished with the use of a search algorithm, such as the brute force, genetic algorithm or etc…”
Get full text
Get full text
Get full text
Article -
8
Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms
Published 2015“…We have compared the results of Pleiades satellite stereo images using dynamic programming and Graph-Cut algorithms, consequently comparing satellites’ imaging sensors and Depth-estimation Algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
9
Hazard identification on fractionation column using rule based expert system
Published 2001“…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
Get full text
Get full text
Article -
10
Multi-state PSO GSA for solving discrete combinatorial optimization problems
Published 2016“…These four algorithms can be used to solve discrete combinatorial optimization problems (COPs). …”
Get full text
Get full text
Thesis -
11
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
12
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…Next will be the extraction of Land Surface Temperature (LST) by using Spectral Radiance Model and Single Window Algorithm through the satellite imagery. …”
Get full text
Get full text
Thesis -
13
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
14
-
15
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…Then, the data is cluster by using K Means to produce labeled input that will be trained by using Gradient Boosting Machine, a decision tree algorithm to make prediction. …”
Get full text
Get full text
Final Year Project -
16
Recursive least square and fuzzy modelling using genetic algorithm for process control application
Published 2007“…A technique for the modelling of nonlinear process control using Recursive Least Square and Takagi-Sugeno Fuzzy System with Genetic Algorithm topology is described. …”
Get full text
Get full text
Conference or Workshop Item -
17
Spam image filtering algorithm / Muhammad Hazim Shahimi
Published 2015“…It has shown that the proposed algorithm is good in classifying the images. There are some improvements that can be suggested for future works such as use more data, apply the better OCR technique, use another image feature extraction, and use another classifier.…”
Get full text
Get full text
Thesis -
18
Testing and validation of a Β; algorithm for cubesat satellites
Published 2016“…For most satellite missions, it is essential to decrease the satellite angular velocity. The Β algorithm is a common algorithm to stabilize the spacecraft by using magnetorquers. …”
Get full text
Get full text
Get full text
Article -
19
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…The proposed algorithm was able to avoid the use of parameter important degree, decision partition and finding the multiple of the universe within the sets. …”
Get full text
Get full text
Get full text
Thesis -
20
Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms
Published 2023Conference Paper
