Search Results - (( program visualization prevention algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Predictive Analytics of the Likelihood Of Road Accidents by Location by Muhammed, Muhammad Bukhari

    Published 2019
    “…The dashboard will also contain at least one visual that gives the statistic of the likelihood of future accident to happen by location which its algorithm will be coded in R programming and be embedded into the main dashboard. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Development of visual odometry based machinery motion assessment system / Low Shee Teng by Low, Shee Teng

    Published 2022
    “…Method 3 would be combining Method 2 with linear based EVM, and Method 4 would be purely linear based EVM. These algorithms are implemented in terms of their computational complexity and visual quality as well as how they provide the amplified motion of video output. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…As a result, although customers may receive an excellent interactive features programme, the backend algorithm is not optimized. This problem may discourage users from applying the program to solve plant disease problems. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…The data collected was used to learn the structure of BN via some known algorithms using R programming language. Based on related literature on KAP regarding dengue studies done in Malaysia from 1986 to 2017, a framework of handcraft BN was also formulated with dengue KAP expert opinion. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism by Pourvakhshouri, Seyedeh Zahra

    Published 2008
    “…Considering two objects of environment and oil, priority ranking matrix was established and CPR scale was calculated based on the fact that various “low/ medium/ high” impacting scenarios of oil can affect the corresponding “low/ medium/ high” sensitive resources. One program was designed to visualize DSM with computation of ESI, coastal sensitivity, oil impact, and CPR values as well as reporting on response alternatives. …”
    Get full text
    Get full text
    Thesis