Search Results - (( java implementation rsa algorithm ) OR ( using second process algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- process algorithm »
- second process »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
7
An improved Levenshtein algorithm for spelling correction word candidate list generation
Published 2016“…Experimental results show that the proposed algorithm outperforms Levenshtein algorithm in terms of the processing time by 36.45% while the accuracy of both algorithms is still the same.…”
Get full text
Get full text
Get full text
Thesis -
8
Second compression for pixelated images under edge-based compression algorithms: JPEG-LS as an example
Published 2021“…To generalize the results, fast general-purpose compression algorithms (7z, bz2, and Gzip) were used too.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Distance vector-hop range-free location algorithm for wireless sensor network
Published 2015“…These localization algorithms are used to measure the actual distances between nodes and eventually determine the respective locations. …”
Get full text
Get full text
Thesis -
10
Development of novel algorithm features in the modelling of cyclic processes
Published 2002“…In principle, the algorithm could be used for many cyclic process. Air separation using rapid pressure swing adsorption (RPSA) is used as an illustration. …”
Get full text
Get full text
Get full text
Article -
11
Resource Minimization in a Real-time Depth-map Processing System on FPGA
Published 2011“…Parallel processing was utilized to achieve high processing speed at low clock frequency. …”
Get full text
Get full text
Conference or Workshop Item -
12
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
13
Performance evaluation of automatic number plate recognition on android smartphone platform
Published 2017“…On the other hand, the traditional algorithm using template matching only obtained 83.7% recognition rate with 0.98 second processing time. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
An efficient parallel clustering algorithm on big data using Spark
Published 2022“…Here we are proposing a new parallel fuzzy clustering algorithm called "An efficient parallel clustering algorithm on big data using spark" which deals with real-time processing. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…The second phase involves image segmentation using the Sauvola method. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
19
Fire Detection Algorithm using Image Processing Techniques
Published 2015“…The algorithm uses RGB colour model to detect the colour of the fire which is mainly comprehended by the intensity of the component R which is red colour. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Multi-objective optimisation of assembly line balancing type-e problem with resource constraints
Published 2016“…Later, the optimisation algorithm will be tested and verified using test problems from literature. …”
Get full text
Get full text
Thesis
