Search Results - (( exploring pre function algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- function algorithm »
- exploring pre »
- pre function »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Multi-Objectives Memetic Discrete Differential Evolution Algorithm for Solving the Container Pre-Marshalling Problem
Published 2019“…In addition, it improves the exploration and exploitation capabilities of the algorithm. …”
Get full text
Get full text
Article -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
PID Tuning Method Using Chaotic Safe Experimentation Dynamics Algorithm for Elastic Joint Manipulator
Published 2021“…The chaos function increased the exploration capability, thus improving the convergence accuracy. …”
Get full text
Get full text
Get full text
Article -
11
Implementation of safe experimentation spiral dynamics algorithm for self-tuning of PID controller in elastic joint manipulator
Published 2022“…Such modification is implemented to exploit the ability of spiral function in enhancing both the algorithm's exploration competency and convergence accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A novel hybrid photovoltaic current prediction model utilizing singular spectrum analysis, adaptive beluga whale optimization, and improved extreme learning machine
Published 2025“…Then, the ABWO algorithm is enhanced to increase the exploitation tendency, simplify whale fall mechanism, and improve exploration/exploitation balace. …”
Get full text
Get full text
Get full text
Article -
13
Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis
Published 2021“…The proposed mathematical algorithm was then finally evaluated on field measurement tested on-site of a real pipeline system. …”
Get full text
Get full text
Get full text
Article -
14
Uncertainty estimation for improving accuracy of non-rigid registration in cardiac images
Published 2015“…In this paper, we define the registration uncertainty and explore its use for diagnostic purposes. We use uncertainty estimation for improving accuracy of a hybrid registration which register a pre-operative CT to an intra-operative echocardiography images. …”
Get full text
Get full text
Get full text
Book Section -
15
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
Get full text
Get full text
Thesis -
16
Performance analysis of predictive functional control for automobile adaptive cruise control system
Published 2023“…Thus, the findings from this work can become a good initial motivation to explore further the capability of the PFC algorithm for future ACC development.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
18
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
Get full text
Get full text
Thesis -
19
Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam
Published 2015“…Further, after a careful investigation into the OLS algorithm, it was shown that the ERR technique which is an essential part of the algorithm to reach model parsimony, has led the resultant model to select an incorrect model terms albeit some improvement in model selection criteria and validation method adopted in this study. …”
Get full text
Get full text
Thesis -
20
Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan
Published 2015“…Further, after a careful investigation into the OLS algorithm, it was shown that the ERR technique which is an essential part of the algorithm to reach model parsimony, has led the resultant model to select an incorrect model terms albeit some improvement in model selection criteria and validation method adopted in this study. …”
Get full text
Get full text
Thesis
