Search Results - (( affecting implementation case algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- affecting implementation »
- implementation case »
- java implementation »
- implementation rsa »
- case algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
PID control system implementation in embedded system for DC motor speed control
Published 2008“…Three experiments have been done to look how much PID control algorithms affect the performances on driving actual DC motor; P1 algorithm experiment, PD algorithm experiment and PID algorithm experiment. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Web Algorithm search engine based network modelling of Malaria Transmission
Published 2013“…The Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Thesis -
8
An improved firefly algorithm for optimal microgrid operation with renewable energy
Published 2017“…The IFA method has been implemented using MATLAB software. The results obtained by IFA was compared to FA and other algorithms based on optimal cost, convergence characteristics and robustness to validate the effectiveness of the IFA. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
10
Cyberbullying detection: a machine learning approach
Published 2022“…Machine learning is a hot topic and it is widely implemented in software, web application and more. Those algorithms are used in the classification or regression model to predict an input. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
An improved diabetes risk prediction framework : An Indonesian case study
Published 2018“…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
Get full text
Get full text
Get full text
Thesis -
12
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…The algorithm is validated using two different methodologies: a simulation model in MATLAB/Simulink and hardware implementation. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan
Published 2017“…As train networks expand, routes complexity increases thus indirectly affecting accustomed user. Users are left to their own devices in order to figure out the best route based on their requirements. …”
Get full text
Get full text
Thesis -
15
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Hence, the research objective is to create an improved diabetic disease detection system using a Flock Optimization Algorithm-Based Deep Learning Model (FOADLM) feature modeling approach that leverages the PIMA Indian dataset to predict and classify diabetic disease cases. …”
Get full text
Get full text
Article -
16
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…This approach is remarkably theoretically efficient, and this approach is the basis of this project to implement a prototype that uses this approach. In this project, for embedding, neural network with adaptive smoothing error back propagation that keeps trying to refine the Stego file until it reaches the best embedding results besides another adaptive Steganography method using concepts called main cases and sub cases. …”
Get full text
Get full text
Thesis -
17
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
Get full text
Get full text
Thesis -
18
Analysis and simulation of handoff scenario for wireless communication network / Darul Ridzuan Muhamad Halib
Published 2006“…It involved a brief study of the various parameters affecting the handoff procedure. It includes a Matlab implementation of the received power (with gaussian noise) versus the distance in the soft handoff case for a mobile moving between two base stations separated by distance d, along a straight line with fixed velocity. …”
Get full text
Get full text
Thesis -
19
An efficient CSMA-CA algorithm for IEEE 802.15.4 wireless sensor networks
Published 2012“…In return, this problem affects the channel utilization and packet collisions. …”
Get full text
Get full text
Conference or Workshop Item -
20
Workload performance evaluation of large spatial database for DSS based disaster management
Published 2017“…Data recorded in the shortest path analysis process reveals that the evaluation and the prediction on workload performance of shortest path analysis using Dijkstra algorithm has been well implemented. It has been proven that the proposed CBR using Hash Search technique has resulted in an excellent prediction of the accuracy measurement. …”
Get full text
Get full text
Get full text
Get full text
Thesis
