Search Results - (( developing formative utilizing algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing formative »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
7
A Comparative Study on Compression of Different Image File Formats
Published 1999“…In this project, an image compression format and algorithm has been analyses. A system has been created for user to convert or display image file format. …”
Get full text
Get full text
Thesis -
8
-
9
Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and...
Published 2007“…The algorithm have been implemented in MATLAB software and a program was developed to investigate the power spectrum of a fixed samples, 100 with the number of elements 15 with the existence of noise. …”
Get full text
Get full text
Thesis -
10
Optimization of micro-end milling process parameters of titanium alloy using non-dominated sorting genetic algorithm
Published 2013“…Response surface methodology was utilized to develop mathematical models of the process outputs. …”
Get full text
Get full text
Thesis -
11
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
12
A new correlation for oil formation volume factor of oil and gas mixture using Group Method of Data Handling; an empirical approach
Published 2014“…In order to develop a new correlation for Bo for oil and gas mixture, Group Method of Data Handling (GMDH) algorithms has been used in this study to generate an optimum model. …”
Get full text
Get full text
Final Year Project -
13
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…One of the main challenge in the design of the Wireless ATM network resides in the formation of the Wireless MAC protocol, that could handle various services with a considerable QoS and providing efficient utilization of the Wireless Channel. …”
Get full text
Get full text
Thesis -
14
A Comparative Study of Some Cellular Manufacturing Techniques
Published 2000“…Overall, Bond Energy Algorithm (BEA) was found to be the best cell formation technique.…”
Get full text
Get full text
Article -
15
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021Get full text
Get full text
Conference or Workshop Item -
16
Identification of Freeform Depression Feature in a Part Using Vertex Attributes From Feature Volume / Pramod S Kataraki and Mohd Salman Abu Mansor
Published 2018“…The results obtained in .SAT file format show the algorithm generated feature volume, feature type and results obtained in .TXT file format show the quantitative values of features volume.…”
Get full text
Get full text
Article -
17
Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa
Published 2020“…New automatic contingency analysis and ranking algorithm due to line and generator outages were separately developed considering the FVSI value. …”
Get full text
Get full text
Thesis -
18
Autonomous multi satellites assembly in keplerian orbits
Published 2013“…In this paper, the guidance and control algorithms of an autonomous multiple satellite assembly are developed in a general keplerian orbit. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
20
A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing
Published 2024“…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
Get full text
Get full text
Get full text
Thesis
