Search Results - (( java implementation rsa algorithm ) OR ( using context using algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using algorithm »
- rsa algorithm »
- using context »
- context using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Providing Ubiquitous Positioning Using Context Aware Handover Algorithm
Published 2012“…This research alms to solve the problem of ubiquitous positioning by designing a context aware handover algorithm for positioning systems. …”
Get full text
Get full text
Thesis -
7
Algorithm for the cliticization of context dependent pronouns in Pashto language
Published 2013“…In this paper, an algorithm is presented for the cliticization of context dependent strong pronouns which backtracks to previous adjacent clause(s) to replace context dependent strong pronoun with clitics using syntactic constraints.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
CPU Burst Processes Prioritization Using Priority Dynamic Quantum Time Algorithm: A Comparison with Varying Time Quantum and Round Robin Algorithms
Published 2015“…The proposed algorithm gave results better than RR and IRRVQ in terms of minimizing the number of context switches, average waiting time, average turnaround time, design and analysis. …”
Get full text
Get full text
Get full text
Article -
9
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
10
Multi-queue CPU Process Prioritization using a Dynamic Quantum Time Algorithm Compared with Varying Time Quantum and Round-Robin Algorithms
Published 2016“…In this study, we propose a priority multi queues algorithm with dynamic quantum time. The algorithm uses multi queues with different quantum times for the processes. …”
Get full text
Get full text
Get full text
Article -
11
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
12
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
Get full text
Get full text
Article -
13
Context aware traffic scheduling algorithm for power distribution smart grid network
Published 2023Article -
14
Context-aware diabetic patient remote monitoring using wearable and mobile App / Mohd Izzat Ismail Hashim
Published 2019“…Previous studies have shown that context-aware techniques have been widely used in healthcare application. …”
Get full text
Get full text
Thesis -
15
CPU Thread Prioritization Using a Dynamic Quantum Time Round-Robin Algorithm
Published 2016“…In this study, we propose a priority Round-Robin algorithm with dynamic quantum time (PDQT). The algorithm used the old fixed quantum time to generate new one for each process depending on its priority. …”
Get full text
Get full text
Get full text
Article -
16
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
Get full text
Get full text
Get full text
Article -
17
Mobile user location prediction: genetic algorithm-based approach
Published 2010“…This paper presents a prediction of user location using genetic algorithm and based location history in finding a number of solutions of possible location when applied to recorded context histories, framework is presented and the result are discussed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
19
Context Aware Handover Algorithms For Mobile Positioning Systems
Published 2014“…This work proposes context aware handover algorithms for mobile positioning systems. …”
Get full text
Get full text
Get full text
Article -
20
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item
