Search Results - (( developing implementation force algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- developing implementation »
- implementation force »
- force algorithm »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The data from photodiode is read by LabVIEW software for further develop to obtain useful output data. The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
11
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…Developing an intelligent wearable robotic hand glove system based on PSCA with self-calibration feature of grasping mechanism is implemented. …”
Get full text
Get full text
Thesis -
12
-
13
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
Get full text
Get full text
Thesis -
14
Re-gripping analysis based on implementation of slip-detection device for robotic hand model
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
-
16
Implementation of motion planning and active force control to a virtual wheeled mobile robot
Published 2004“…Results clearly indicate the successful realization as well as implementation of the developed virtual WMR simulator in which the WMR has been conclusively shown to be very stable, robust and accurate in its tracking ability.…”
Get full text
Get full text
Thesis -
17
Development of a robotic hand glove system for secure grasp with AI wireless sensor data
Published 2023“…Robotic Hand glove is one of the most commonly used technique in the rehabilitation systems. In this paper, we developed a robotic hand system with a proposed sensing mechanism-based AI algorithm, which can acquire grasping forces from human fingers. …”
Get full text
Get full text
Conference or Workshop Item -
18
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…This eventually brought the study to the implementation of the Inverse Single Drop Multistage (ISDMS)-2D Fuzzy Algorithm on the Mass Transfer of Multiple Drops in Multistage System. …”
Get full text
Get full text
Thesis -
19
Development of airbag suit system for motorcyclist
Published 2014“…The project involved development of a control algorithm for the airbag inflation and performing analysis on the finished prototype. …”
Get full text
Get full text
Get full text
Article -
20
Integrating fuzzy logic and brute force algorithm in optimizing energy management systems for battery electric vehicles
Published 2023“…This research proposes a solution to achieve more efficient control of HVAC consumption by integrating fuzzy logic techniques with brute-force algorithms to optimize the Energy Management System (EMS) in BEVs. …”
Get full text
Get full text
Get full text
Article
