Search Results - (( java segmentation using algorithm ) OR ( using constructs rsa algorithm ))
Search alternatives:
- java segmentation »
- using constructs »
- using algorithm »
- constructs rsa »
- rsa algorithm »
-
1
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…However, we also constructed an algorithm for a parallel version of Vector Addition Chains to enhance the performance. …”
Get full text
Get full text
Research Reports -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Lastly this project will construct a Graphical User Interface (GUI) using Maple 17. …”
Get full text
Get full text
Book Section -
4
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
5
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…Results from the study and analysis found that AAβ cryptosystem have speeds exceeding RSA and ECC cryptosystem encryption process. While the decryption process, AAβ have speeds exceeding RSA and ECC. …”
Get full text
Get full text
Get full text
Thesis -
7
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
Get full text
Get full text
Thesis
