Search Results - (( java application rsa algorithm ) OR ( variable estimation matching algorithm ))
Search alternatives:
- variable estimation »
- java application »
- application rsa »
- rsa algorithm »
- matching »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…There are many types of motion estimation method but the most used method is the block matching method which is the fixed block matching and the variable block matching. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
7
Development of an explainable machine learning model for predicting depression in adults with type 2 diabetes mellitus: a cross-sectional SHAP-based analysis of NHANES 2009-2023
Published 2026“…A streamlined XGBoost model incorporating only these 10 variables achieved an area under the curve of 0.886, closely matching the predictive capability of the full model. …”
Get full text
Get full text
Get full text
Article -
8
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Several techniques have been proposed in the past decade, particularly error concealment (EC) algorithms. In this study, attention is focused on the algorithms that have high efficiency to fill-in the damaged patches, for example, Multi-directional interpolation (MDI), neighboring matching EC, etc. …”
Get full text
Get full text
Thesis -
9
Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis
Published 2011“…Optimal condition derived from Taguchi method showed that, the method couldreduce reaction time, molecular sieve amount and enzyme amount with high conversion (96%, 92%, 88% for xylitol stearate, xylitol palmitate, and xylitol caprate, respectively) compared to conventional one variable at a time approach. Artificial Neural Network (ANN) method was also employed for the estimation of esterification yield in enzymatic synthesis of xylitol esters. …”
Get full text
Get full text
Thesis -
10
Modelling and control strategies for hydrokinetic energy harnessing
Published 2020“…Subsequently, the metaheuristic method based on the combination of the Hill-Climbing Search (HCS) MPPT algorithm and the Fuzzy Logic Controller has been proposed to produce a variable step size compared to the fixed step size in conventional HCS algorithm. …”
Get full text
Get full text
Thesis
