Search Results - (( using application design algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- application design »
- using application »
- design algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Controller And Circuitry Design And Implementation For Fire Fighting Robot For MIROC 2014 Competition
Published 2014Get full text
Get full text
Final Year Project -
7
-
8
Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi
Published 2012“…There is several algorithms use in sequencing of DNA fragment. This paper presents a study on design and analysis of construction and recombination module using IduryWaterman algorithm and fragment assembly application using Verilog. …”
Get full text
Get full text
Thesis -
9
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
10
Effectiveness of nature-inspired algorithms using ANFIS for blade design optimization and wind turbine efficiency
Published 2019“…It was found that the optimized blade design parameters were obtained using an ABC algorithm with the maximum value power coefficient higher than ACO and PSO. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…For that reason, it is the purpose of this thesis to outline the implementation and use of adaptive-iterative algorithm in designing antenna array. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
OPTIMAL DESIGN OF A BLDC MOTOR BY GENETIC ALGORITHM
Published 2007“…The project report describes an optimal design of Brushless DC (BLDC) motor using Genetic Algorithm (GA) and Simulated Annealing (SA). …”
Get full text
Get full text
Final Year Project -
14
-
15
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. …”
Get full text
Get full text
Get full text
Article -
16
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
19
-
20
