Search Results - (( ais implementation using algorithm ) OR ( program implementation rsa algorithm ))
Search alternatives:
- program implementation »
- implementation using »
- ais implementation »
- implementation rsa »
- using algorithm »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
-
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
5
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
6
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
7
-
8
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
9
Application of minimax algorithm in dots and boxes game
Published 2025“…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
Car dealership web application
Published 2022“…In this project, a web application and a web service were proposed and implemented. The used car dealership web application was implemented with ASP.NET Core. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Active intelligent control of vibration of flexible plate structures
Published 2011“…The approach is realised within SISO and SIMO AVC structures using RCGA, PSO and AIS algorithms. These are implemented on the flexible plate structure with various disturbance signals. …”
Get full text
Get full text
Thesis -
13
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
Get full text
Get full text
Thesis -
14
-
15
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…These problem can be solved using AI technology. Reinforcement is the process of strengthening an army and it is a crucial issue in gaming design as well. …”
Get full text
Get full text
Get full text
Thesis -
16
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
17
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…Based on this, the research employ a linear regression technique in the AI penetration testing. This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article -
18
Embedded Artificial Intelligent (AI) To Navigate Cart Follower
Published 2018“…The weights and biases generated through the training process is depended on the training algorithm, initial weights and biases for training and the dataset used in the process. …”
Get full text
Get full text
Monograph -
19
The Implementation of Genetic Algorithm in Path Optimization
Published 2005“…In this project, TSP will be used to model and easy visualize the path optimization problem and Genetic Algorithm (GA) was chosen to be implemented in resolving the problem. …”
Get full text
Get full text
Final Year Project -
20
Processing time estimation in precision machining industry using AI / Lim Say Li
Published 2017“…Neural Network (NN) model is chosen as the artificial intelligence approach used in this research. Levenberg-Marquardt algorithm is used as the training algorithm. …”
Get full text
Get full text
Thesis
