Search Results - (( ((using function) OR (using action)) based algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- using function »
- rsa algorithm »
- using action »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
Get full text
Get full text
Get full text
Thesis -
6
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
Get full text
Get full text
Article -
7
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…First, unified ADALINEs based fundamental component extraction algorithm is proposed for dual functionality. …”
Get full text
Get full text
Thesis -
8
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
9
Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller
Published 2010“…This study investigates the use of Genetic Algorithms (GA) to design and implement of Fuzzy Logic Controllers (FLC). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Hybrid genetic manta ray foraging optimization and its application to interval type 2 fuzzy logic control of an inverted pendulum system
Published 2020“…This paper presents an improvised version of Manta-Ray Foraging Optimization (MRFO) by using components in Genetic Algorithm (GA). MRFO is a recent proposed algorithm which based on the behaviour of manta rays. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS
Published 2019“… PID Controllers have different algorithms or methods in which the controller action is based on Error or Process Variable (PV). …”
Get full text
Get full text
Final Year Project -
13
A novel softsign fractional-order controller optimized by an intelligent nature-inspired algorithm for magnetic levitation control
Published 2025“…This study presents a novel softsign-function-based fractional-order proportional–integral–derivative (softsign-FOPID) controller optimized using the fungal growth optimizer (FGO) for the stabilization and precise position control of an unstable magnetic ball suspension system. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Knowledge base tuning using genetic algorithm for fuzzy behavior-based autonomous mobile robot
Published 2005“…This paper presents a new schema to overcome behavior-based problems based on Fuzzy Logic Controller (FLC) where the fuzzy knowledge bases are tuned automatically by Genetic Algorithm (GAs), known as Genetic Fuzzy System (GFS). …”
Get full text
Get full text
Conference or Workshop Item -
15
Context aware app recommendation using email semantic analysis
Published 2019“…This mean s that people can easily receive some recommendation for their next action from the email applicati on based on the email the y received. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
Published 2010“…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Deep Reinforcement Learning For Control
Published 2021“…Potential actions must be taken based on prior experiences using a trial and error process. …”
Get full text
Get full text
Monograph -
18
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
Get full text
Get full text
Thesis -
19
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…The performance is tested for human action recognition and scene classification. This is a crucial step as it is the first attempt of using fuzzy BK subproduct for classification. …”
Get full text
Get full text
Thesis -
20
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…Finally, a set of experiments to validate the proposed algorithms has been conducted. The algorithms function with success rate from 74% up to 100% and could handle the orientation of a tilted object up to 45 degrees. …”
Get full text
Get full text
Get full text
Get full text
Thesis
