Search Results - (( developing development action algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- development action »
- implementation rsa »
- action algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
Get full text
Get full text
Thesis -
7
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…Finally, a software tool based on an adaptive neural network for power system security assessment was developed. The idea of the AANN approach presented in this thesis is to generalise the security assessment method with the consideration of remedial action for any operating point. …”
Get full text
Get full text
Thesis -
8
An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective
Published 2023“…Sustainable development is a problem-solving method that simultaneously accounts for the economic, environmental, and social impacts of actions. …”
Get full text
Get full text
Article -
9
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…In previous work, an Adaptive Linear Neuron (ADALINE) based extraction algorithm has been developed to generate reference currents. …”
Get full text
Get full text
Thesis -
10
Simulation of an adaptive artificial neural network for power system security enhancement including control action
Published 2015“…The developed method is proved to be a steady-state security assessment tool for supplying possible control actions to mitigate an insecure situation resulting from credible contingency. …”
Get full text
Get full text
Get full text
Article -
11
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
Get full text
Get full text
Get full text
Article -
12
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
13
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…This study implemented Ant Colony Optimization Algorithm to develop classification rules for predicting the attackers of online shaming. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD simulation model has been developed to test the algorithm on NRG. Two experiments have been conducted to test the correctness of NRGDD algorithm. …”
Get full text
Get full text
Thesis -
17
Magnetic attitude control options for earth pointing small satellite
Published 2011“…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
Get full text
Get full text
Thesis -
18
Adaptive hybrid fuzzy-proportional plus crisp-integral current control algorithm for shunt active power filter operation
Published 2016“…The Fuzzy-P current controller is developed to perform gain tuning procedure and proportional control action. …”
Get full text
Get full text
Article -
19
-
20
Development of land target following system of hexacopter
Published 2015“…This paper discussed the development of a land target following system for hexacopter using on-board camera. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
