Search Results - (( simulation notification system algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- simulation notification »
- notification system »
- system algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…Meanwhile, an email notification was introduced in ICMP and HTTP based monitoring as a notification to the administrator when the failure occurs.…”
Get full text
Get full text
Thesis -
7
-
8
Image processing-based flood detection
Published 2019“…The citizens will get the information if they follow that account (early warning system) on Twitter. The result of this simulation using prototype that we have made is that the system can read the water conditions with an increase in accuracy reaching 99.6o/o.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…A multi-level alert system ensures early threat mitigation, with alarms, SMS, notifications, and email alerts to maximize awareness. ? …”
Article -
10
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 3, we propose a new online system to detect malicious spam emails and to adapt to the changes of malicious URLs in the body of spam emails by updating the system daily. …”
Get full text
Get full text
Thesis
