Search Results - (( _ constructive ((method algorithm) OR (path algorithm)) ) OR ( java application rsa algorithm ))
Search alternatives:
- method algorithm »
- java application »
- application rsa »
- path algorithm »
- rsa algorithm »
- constructive »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Route optimization using shortest path method / Muhamad Faisal Amin Shakri
Published 2025“…This study investigated the implementation and comparison between well known shortest path method which are Dijkstra’s algorithm, Bellman-Ford, and A* algorithm. …”
Get full text
Get full text
Thesis -
4
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
5
-
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
An efficient algorithm to improve oil-gas pipelines path
Published 2018“…Therefore, the aim of this study is to propose a new algorithm to obtain the shortest path connecting oil-gas wells and addressing obstacles that may appear on the path connecting any two wells. …”
Get full text
Article -
8
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…The aim is to solve the above-mentioned problems via an optimization mechanism based upon the combination between runtime path prediction method and heuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
10
Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique
Published 2012“…The optimizing of optimal path trace back system for Smith-Waterman algorithm using structural modelling techniques are presented in this paper. …”
Get full text
Get full text
Student Project -
11
An application of Floyd-Warshall Algortihm in finding shortest path of order picker in warehouse / Saidatul Aisyah Roslan, Siti Norhakimah Mohd Yatim and Siti Sarah Sulaiman
Published 2019“…For the result, shortest path for the order pickers in iterations. The algorithm used can help the order picker to have the shortest path, but it have no direct path. …”
Get full text
Get full text
Student Project -
12
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…For detecting infeasible paths that involve Object Constraints Language (OCL) constraints, new method is needed to cover all the sophisticated constructs of OCL. …”
Get full text
Get full text
Get full text
Thesis -
13
MAZE ROBOT: APPLYING AUTONOMOUS VEHICLE NAVIGATION ALGORITHM WITH EVENT-DRIVEN PROGRAMMING
Published 2011“…Hardware and software co-design method is used to construct the mobile robot. The basic navigation algorithm was developed using finite state machine (FSM). …”
Get full text
Get full text
Final Year Project -
14
Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam
Published 2015“…The results of the fingerprint algorithm for localization shows higher accuracy compare to other methods and the implementation of this method are easy as user require only a mobile device equipped with Wi-Fi facilities to determine the location. …”
Get full text
Get full text
Thesis -
15
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
16
HTS : a hierarchical method for load balancing in autonomous networks.
Published 2008“…Proposed algorithm fulfills at two steps. Firstly overload detection function through an explorer algorithm to construct overloaded link table due to disruption link. …”
Get full text
Get full text
Article -
17
Development of obstable avoidance system for 3D robot navigation
Published 2024“…Additionally, the planner and controller modules from Nav2 were employed for path planning and obstacle avoidance. Once the algorithm was fully tested and proven functional in simulation, it would be implemented on the physical robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Design and modelling of an autonomous robotic airship with soft computing control
Published 2012“…Along with the prototype airship, a path planner was also proposed for the UAV for the purpose of obstacle avoidance and path optimization using genetic algorithm to minimize on the distance travelled and to generate the shortest path to cover the specified waypoints. …”
Get full text
Get full text
Get full text
Thesis -
19
Frequent itemset mining using graph theory / Mohammad Arsyad Mohd Yakop
Published 2017“…The searching process in the FR-Graph involves the construction of two methods: getPath and item-merging. …”
Get full text
Get full text
Thesis -
20
Modeling and Implementation of Omni-directional soccer robot with wide vision scope applied in Robocup-MSL
Published 2009Get full text
Working Paper
