Search Results - (( developing affecting change algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing affecting »
- affecting change »
- change algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Neural network application in the change of reservoir water level stage forecasting
Published 2015“…The finding shows that 2 days of delay have affected the change in stage of the reservoir water level. …”
Get full text
Get full text
Get full text
Article -
7
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…When development of cities took place, consequently will increase the concentration of carbon dioxide in the atmosphere which in turn affecting the surface energy budget and indirectly may affect in global climate. …”
Get full text
Get full text
Thesis -
8
-
9
Development of heuristic task scheduling algorithm in cloud computing
Published 2016Get full text
Get full text
Proceeding Paper -
10
-
11
Reusability techniques in load-flow analysis computer program
Published 2004“…Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
Get full text
Get full text
Article -
12
Location Fingerprinting Technique for WLAN Device-Free Indoor Localization System
Published 2017“…The extensive experiments were performed that allow quantification of how changes in an environment affect accuracy. Thus, it is demonstrated that each link offers a viable approach to developing a more robust system for device-free localization that is less susceptible to changes in the environment. © 2016, Springer Science+Business Media New York.…”
Get full text
Get full text
Article -
13
WLAN location fingerprinting technique for device-free indoor localization system
Published 2016“…The extensive experiments were performed that allow quantification of how changes in an environment affect accuracy. Thus, it is demonstrated that each link offers a viable approach to developing a more robust system for device-free localization that is less susceptible to changes in the environment. …”
Get full text
Get full text
Conference or Workshop Item -
14
Monitoring the impacts of drought on land use/cover: a developed object-based algorithm for NOAA AVHRR time series data
Published 2011“…As a novel idea in this study, it developed a new object-based classification algorithm for AVHRR (Advanced Very High Resolution Radiometer) data. …”
Get full text
Get full text
Get full text
Article -
15
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…This changing will cause noise amplification and affects the convergence speed. …”
Get full text
Get full text
Get full text
Thesis -
16
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
Get full text
Get full text
Thesis -
17
A New Cell Formation Method Considering Operation Sequences And Production Volumes
Published 2013“…Under such circumstance, frequent changes take places in product design, product mix, product volume and production process affecting the manufacturing layout. …”
Get full text
Get full text
Thesis -
18
Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems
Published 2025“…Sensor failure, environmental changes, or bad weather can lead to the emergence of abnormal data, which can affect the decision-making process and may have disastrous consequences. …”
Get full text
Get full text
Get full text
Article -
19
Protovoltaic boost DC/DC converter with adaptive perturb and observe-fuzzy maximum power point tracking algorithm
Published 2013“…For comparison purpose,conventional perturb and observe, and fuzzy logic control algorithms were modelled too. In hardware development, the prototype was developed and tested to verify simulation work. …”
Get full text
Get full text
Thesis -
20
Development of wireless engine lubrication oil life alert system
Published 2015“…Hence, the development of this wireless engine lubricant oil change alert system (Wi-LoCAS) in this research is fully controlled by microcontroller. …”
Get full text
Get full text
Get full text
Get full text
Thesis
