Search Results - (( basic power function algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- function algorithm »
- implementation rsa »
- rsa algorithm »
- basic power »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad
Published 2016“…The solution to power dispatch problem has been an important and basic optimization procedure in both conventional and restructured power systems. …”
Get full text
Get full text
Thesis -
8
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Basically it is used for message digest. One of the algorithms in hash function is RIPEMD-160. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Basically, it is used for message digest. RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Solar power inverter
Published 2013“…It is highlights the aspects of power electronic packaging concerning functional and packaging integration in solar inverter technology. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Implementation of UPFC model into fast decoupled load flow
Published 2004“…The model is integrated through sequential approach, where equations for solving these devices are separated from the basic Fast Decoupled equations. By using this approach, the basic Fast decoupled algorithm can be added with functionality to analyze UPFC without the need to modify the whole algorithm, which will require minimum modification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Avoiding under-reaching in twin circuit lines without residual current input from the parallel line
Published 2023Conference Paper -
13
A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem
Published 2023“…The results show that the ABRO algorithm outperforms the original ABC algorithm and ARO algorithm in all benchmark functions and successfully reduces the cost of the power generation for the IEEE- 26 bus system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Power System State Estimation In Large-Scale Networks
Published 2010“…Power system state estimation constitutes one of the critical functions that are executed at the control centers. …”
Get full text
Get full text
Thesis -
15
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…In the recent era, researchers used different routing algorithms to decrease the power consumption in order to increase the wireless sensor network life. …”
Get full text
Get full text
Conference or Workshop Item -
16
Vault’s floor security sensor with RFID access using microcontroller: article / Mohd Firdouz Bahtiar
Published 2009“…The design is just a module to demonstrate the basic function of the floor security system that will be observed by the PIC16f877a microcontroller by Microchip. …”
Get full text
Get full text
Article -
17
Long-term optimal planning for renewable based distributed generators and battery energy storage systems toward enhancement of green energy penetration
Published 2025“…This hybrid approach aims to simultaneously minimize three long term objective functions from the economic, environmental, and technical point of view: total expected investment, operational, and carbon emission cost, power loss, and voltage deviation. …”
Article -
18
Vault's floor security sensor with RFID access using microcontroller/ Mohd Firdouz Bahtiar
Published 2009“…The design is just a module to demonstrate the basic function of the floor security sytem that will be observed by the PIC16f877a microcontroller by Microchip. …”
Get full text
Get full text
Thesis -
19
A highly efficient algorithm for phased-array mmWave massive MIMO beamforming
Published 2021“…In this process, the objective function of the spectral efficiency is derived, then the basic tracking principle and least square (LS) techniques are deployed to design the proposed hybrid precoding. …”
Get full text
Get full text
Article -
20
