Search Results - (( program visualization prevention algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- visualization prevention »
- prevention algorithm »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Predictive Analytics of the Likelihood Of Road Accidents by Location
Published 2019“…The dashboard will also contain at least one visual that gives the statistic of the likelihood of future accident to happen by location which its algorithm will be coded in R programming and be embedded into the main dashboard. …”
Get full text
Get full text
Final Year Project -
7
Development of visual odometry based machinery motion assessment system / Low Shee Teng
Published 2022“…Method 3 would be combining Method 2 with linear based EVM, and Method 4 would be purely linear based EVM. These algorithms are implemented in terms of their computational complexity and visual quality as well as how they provide the amplified motion of video output. …”
Get full text
Get full text
Get full text
Thesis -
8
Leaf condition analysis using convolutional neural network and vision transformer
Published 2024“…As a result, although customers may receive an excellent interactive features programme, the backend algorithm is not optimized. This problem may discourage users from applying the program to solve plant disease problems. …”
Get full text
Get full text
Get full text
Article -
9
Risk assessment of dengue in Betong Sarawak using simple mathematical model
Published 2020Get full text
Get full text
Student Project -
10
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…The data collected was used to learn the structure of BN via some known algorithms using R programming language. Based on related literature on KAP regarding dengue studies done in Malaysia from 1986 to 2017, a framework of handcraft BN was also formulated with dengue KAP expert opinion. …”
Get full text
Get full text
Thesis -
11
Coastal Priority Ranking in Oil Spill Response Decision Support Mechanism
Published 2008“…Considering two objects of environment and oil, priority ranking matrix was established and CPR scale was calculated based on the fact that various “low/ medium/ high” impacting scenarios of oil can affect the corresponding “low/ medium/ high” sensitive resources. One program was designed to visualize DSM with computation of ESI, coastal sensitivity, oil impact, and CPR values as well as reporting on response alternatives. …”
Get full text
Get full text
Thesis
