Search Results - (( frames optimization path algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- frames optimization »
- optimization path »
- java application »
- application rsa »
- path algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Optimizing passenger before- boarding time using Queuing Theory and Dijkstra Algorithm / Nur Ariena Farhana Noor Hamizan
Published 2021“…To achieve these objectives, Queuing Theory Problem and Shortest Path Problem (Dijkstra Algorithm) were applied. Based on the result, both objectives were successfully achieved. …”
Get full text
Get full text
Thesis -
6
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…For this purpose, the proposed scheme utilises a well-known technique, i.e., Kruskal’s algorithm, to find an optimal path from source to destination wearable devices. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
8
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis -
9
Reliable Fault Tolerant-Based Multipath Routing Model for Industrial Wireless Control Systems
Published 2022“…The multipath routing model is developed based on optimal network planning and deployment algorithm. …”
Get full text
Get full text
Article -
10
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…The AUR is established based on Lyapunov stability theorem to find the limits of the optimization step size that guarantee a stable path on the objective function trajectory. …”
Get full text
Get full text
Thesis -
11
Object tracing from synthetic fluid spray through instance segmentation
Published 2024“…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
Get full text
Get full text
Thesis -
12
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…The proposed algorithms aim to accelerate the processes of distortion removal and rectification using precomputed combined maps. …”
Get full text
Get full text
Thesis
