Search Results - (( developing implementation re algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- developing implementation »
- java implementation »
- implementation rsa »
- implementation re »
- rsa algorithm »
- re algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Re-gripping analysis based on implementation of slip-detection device for robotic hand model
Published 2016Get full text
Get full text
Conference or Workshop Item -
7
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…A genetic algorithm is developed to tune the membership functions (MFs) of input variables of GDF and GSF controllers. …”
Get full text
Get full text
Thesis -
8
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…We have chosen four neighborhood based algorithms which are commonly used in optimization problems and divided them in newly implemented and re-implemented category. …”
Get full text
Get full text
Thesis -
9
Comparative Analysis of Neighborhood based Meta-heuristic Algorithms for MC/DC Test Data Generation
Published 2016“…In order to help test engineers to make informed decision on the best neighborhood based implementations, this paper investigates the size and time performance of two MC/DC test strategies re-implementation based on Simulated Annealing against two newly developed strategies based on Great Deluge and Late Acceptance Hill Climbing algorithms respectively. …”
Get full text
Get full text
Conference or Workshop Item -
10
Traffic management algorithms for LEO satellite networks
Published 2016“…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
Get full text
Get full text
Thesis -
12
Gripping an object based on inspection of slip events for a robotic hand model
Published 2017“…The robotic system has attempted to accomplish the re-gripping mission autonomously. Therefore, an automatic feedback control algorithm is developed to perform re-gripping tasks based on the distance at which an object has slipped. …”
Get full text
Get full text
Get full text
Article -
13
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…This research investigates and re-designs the “speed up robust feature” (SURF) algorithm for Smartphones to enable it to recognize the real world objects. …”
Get full text
Get full text
Thesis -
14
Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow / Nurul Ain Husaini
Published 2010“…Second objective is to perform the timing analysis and third objective to implement the design using ASIC flow. The design was developed in VerilogHDL coding, simulated and synthesized using Xilinx ISE 12 and then re-implemented using Synopsys ASIC Tools implies the timing diagram and analyzes using the Design Compiler and Integrated circuit compiler to produce the layout. …”
Get full text
Get full text
Student Project -
15
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016“…The second method is automatic optimization using Genetic Algorithm. That depends on the principle of natural selection as proposed by Darwin The genetic program was coupled with the reservoir flow model to re-evaluate the chosen wells at each iteration until obtaining the optimal choice. …”
Get full text
Get full text
Conference or Workshop Item -
16
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…This study emphasized on optimization of prediction on discourse elements and writing style that leading to the development of CbAS through four phases of research methodology. (1) Pre-processing and data extraction phase where essay will be parsed into word (token) and implemented Word Correction Algorithm to re-correct the misspell word. (2) Training process of determination and classification of discourse elements using Multivariate Bernoulli Model (MMB) Technique. …”
Get full text
Get full text
Thesis -
17
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…In addition, the developed AANN has been successfully implemented to dynamic security assessment for predicting the security status of the IEEE 9-bus test system.…”
Get full text
Get full text
Thesis -
18
-
19
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
20
Logistic Regression Methods with Truncated Newton Method
Published 2012“…The study was conducted by developing the Newton version of TR-KLR and TR-IRLS algorithm respectively. …”
Get full text
Get full text
Article
