Search Results - (( based reservation using algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimizing energy and reserve minimization in a sustainable microgrid with electric vehicle integration: dynamic and adjustable manta ray foraging algorithm by Abed, Adnan Ajam, Suwaed, Mahmood Sh., Al-Rubaye, Ameer H., Awad, Omar I., Mohammed, M.N, Hai, Tao, Kadirgama, Kumaran, Karah Bash, Ali A. H.

    Published 2023
    “…This paper presents a novel approach for optimizing energy and reserve minimization in a sustainable integrated microgrid with electric vehicles (EVs) by the use of the dynamic and adjustable Manta Ray Foraging (DAMRF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…The classic incremental conductance (IC) MPPT algorithm is widely used in the literature. However, when large changes occur in the irradiance, the performance of this algorithm is degraded. …”
    Get full text
    Article
  8. 8

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Thirdly, an energy algorithm called the Efficient Battery Life-aware Power Saving (EBLAPS) algorithm is proposed to address the problems of minimizing energy at the expense of response due to how energy sleep parameters are adjusted based on the residual energy and the use of standard sleep mode algorithms consumes high energy because of frequent transition to listening mode in the case of light traffic. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Forest health mapping in Gunung Basor permanent forest reserve by using unmanned aerial vehicle by Maizatul Afiqah Mohd Zaki

    Published 2019
    “…There was no previous study that has been done to ensure the forest health at Gunung Basor Permanent Forest Reserve. The DJI Phantom 4Pro was used to capture the image of the study area by using Pix4D, and the image will be process in Data Mapper by using VARI algorithm. …”
    Get full text
    Get full text
    Undergraduate Final Project Report
  10. 10

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks by Al-Sanabani, Maher Ali

    Published 2008
    “…The second proposed scheme is a bandwidth reservation scheme based on Mobility Prediction Scheme (MPS). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Research On Photovoltaic Mppt Control Method Based On Improved Bas Algorithm And Variable Step-Size Inc Method by Li, Wenli

    Published 2024
    “…In this study, a MPPT control method based on IBAS and VSINC was proposed to obtain a better performance in MPPT.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    An efficient control implementation for inverter based harmony search algorithm by Najeeb M., Daniyal H., Razali R., Bin Mansor M.

    Published 2023
    “…The mean absolute error (MAE) is used as an optimization problem to minimize the output voltage error for the developed controller (PI-HS) as compared to the PI controller based particale swarm optimization algorithm (PI-PSO). …”
    Article
  16. 16

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The system will automatically check for the nearest vacant bay and reserve it for the current user allowing a different bay reservation for the next user. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A provision-aware fair bandwidth distribution marker algorithm for DiffServ networks by Sani, Yusuf, Othman, Mohamed

    Published 2011
    “…In this paper, we propose a new three-colour marker, named paItswTCM (provision-aware Improved TSW based Three-Colour Marker). We compare our new algorithm with both time-sliding window markers and token-bucket-based markers using simulations. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…However, these surveys are not covered for both IC-MFD algorithms based hand-crafted features and IC-MFDs algorithms based machine-crafted features. …”
    Article
  20. 20

    Adaptive framed pseudo-Bayesian Aloha algorithm with priorities by Habaebi, Mohamed Hadi, Mohd Ali, Borhanuddin

    Published 2000
    “…A new wireless framed pseudo-bayesian Aloha algorithm with adaptive priorities, for wireless ATM reservation-based TDMA MAC prolocols, is presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article