Search Results - (( java application rsa algorithm ) OR ( _ application study algorithm ))

Refine Results
  1. 1

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…The result of the study shows that the proposed algorithm has the accuracy of 87%. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…The results from the comparative study and lab experiment give the best algorithm which is guide to design the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…The adaptive-iterative algorithm is an error-reduction algorithm that has been extensively studied in recent years. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Here, the reason of choosing ABS algorithm as the studied was also being explained. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16
  17. 17

    Hybrid DE-PEM algorithm for identification of UAV helicopter by Tijani, Ismaila, Akmeliawati, Rini, Legowo, Ari, Budiyono, Agus, Abdul Muthalif, Asan Gani

    Published 2014
    “…It gives better results when compared with conventional PEM algorithm inside MATLAB toolboxes. Research limitations/implications – This study is applicable to only linearized state-space model. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…Overall, the study shows that the UHDS8 algorithm produces better results compared to the FUHS16 and UHDS16 algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19
  20. 20

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis