Search Results - (( java implementation rsa algorithm ) OR ( using practical modified algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified Image Enhancement Algorithm For Dorsal Hand Veins Imaging by Gan, Siew Ling

    Published 2018
    “…The evaluation results between modified image enhancement algorithm are compared with the existed algorithm. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The algorithm is a hybrid algorithm that operates using dual level search strategy that takes merits of a particle swarm optimisation algorithm and a modified adaptive bats sonar algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Standard equations for predicting the discharge coefficient of a modified high-performance side weir by Zaji, Amir Hossein, Bonakdari, Hossein, Shamshirband, Shahaboddin

    Published 2017
    “…The Particle Swarm Optimization (PSO) algorithm was used to optimize the parameters of the equations. …”
    Get full text
    Get full text
    Article
  12. 12

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…The Takagi-Sugeno-Kang (TSK) type fuzzy inference system was chosen and constructed by an automatic generation of clusters as well as membership functions and minimal rules through the use of hybrid fuzzy clustering and the modified apriori algorithms respectively. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Disparity between theory & practice beyond the worst-case competitive analysis by Iqbal, Javeria, Ahmad, Iftikhar, Shah, Asadullah

    Published 2019
    “…Online algorithms are used in a variety of situations such as forex trading, cache replacement, and job scheduling etc. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm by Azmin, Farah Ayuni

    Published 2017
    “…This research proposed a modified regular shape which is based on the best selected regular shape, modified using genetic algorithm on the central processing unit (CPU). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Reconstructing applicable chaotic Baptista-type symmetric cryptosystem by Daud, Muhamad Azlan

    Published 2014
    “…We then designed a new compression algorithm developed using ideas from the Huffman coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    New Quasi-Newton Equation And Method Via Higher Order Tensor Models by Gholilou, Fahimeh Biglari

    Published 2010
    “…By using a new equation, the BFGS method is modified. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Simplified adaptive linear neuron harmonics extraction algorithm for dynamic performance of shunt active power filter by Mohd Zainuri, Muhammad Ammirrul Atiqi, Mohd Radzi, Mohd Amran, Che Soh, Azura, Mariun, Norman, Abd Rahim, Nasrudin

    Published 2016
    “…The proposed harmonics extraction is an innovative work over the established algorithm, known as Modified Widrow-Hoff ADALINE algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
    Get full text
    Get full text
    Thesis