Search Results - (( java improving generalized algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- improving generalized »
- generalized algorithm »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
8
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Future research includes exploring the use of separator Database in PrefixSpan with pseudoprojection to improve mining generalized sequential patterns, particularly in handling mining constrained sequential patterns.…”
Get full text
Thesis -
9
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Future research includes exploring the use of separator Database in PrefixSpan with pseudoprojection to improve mining generalized sequential patterns, particularly in handling mining constrained sequential patterns.…”
Get full text
Get full text
Thesis -
10
Improving Class Timetabling using Genetic Algorithm
Published 2006Get full text
Get full text
Get full text
Thesis -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
Get full text
Get full text
Citation Index Journal -
12
Visdom: Smart guide robot for visually impaired people
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…While much research has been conducted, focusing on the development of algorithms and techniques for HAR, less emphasis was placed on the improvement of HAR research’s efficiency in terms of sensor data collection, annotation, and storage, resulting in the use of incomplete, inefficient, and time-consuming data engineering systems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Smart student timetable planner
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
