Search Results - (( from implementation force algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- implementation force »
- from implementation »
- java application »
- force algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
7
Magnetic Optimization Algorithm Approach For Travelling Salesman Problem
Published 2012“…In this implementation, each magnetic agent or particle in Magnetic Optimization Algorithm represents a candidate solution of the Travelling Salesman Problem. …”
Get full text
Get full text
Conference or Workshop Item -
8
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
Get full text
Get full text
Thesis -
10
-
11
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…Feature selection for IDS is a fundamental step in detection procedure and aims to eliminate some irrelevant and unneeded features from the dataset. This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Application of inerter in passenger vehicle suspension systems / Soong Ming Foong
Published 2015“…Then, switching algorithms were implemented to the inerter to evaluate potential further ride performance improvement brought by these modifications. …”
Get full text
Get full text
Thesis -
13
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…This eventually brought the study to the implementation of the Inverse Single Drop Multistage (ISDMS)-2D Fuzzy Algorithm on the Mass Transfer of Multiple Drops in Multistage System. …”
Get full text
Get full text
Thesis -
14
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
15
Development of airbag suit system for motorcyclist
Published 2014“…The system takes the inputs from IMUs and GPS for G-force and speed calculation. …”
Get full text
Get full text
Get full text
Article -
16
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…Brute Force attack traffic collected in a client-server model is implemented in proposed method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Finally, a comparison of the newly proposed algorithm and previous algorithms will be evaluated in a table.…”
Get full text
Get full text
Get full text
Article -
18
Two-axis position-based impedance control of a 2-DOF robotic finger / Khairunnisa Nasir
Published 2017“…The positionbased impedance control algorithm was designed by regulating the mechanical impedance of the robotic finger based on force measurements from the two embedded force sensors. …”
Get full text
Get full text
Thesis -
19
Route Planning Analysis In Holes Drilling Process Using Magnetic Optimization Algorithm For Electronic Manufacturing Sector
Published 2013“…Based on this motivation, this paper proposes an approach which is based on the experimentation of Magnetic Optimization Algorithm. In this implementation, each magnetic agent or particle in Magnetic Optimization Algorithm represents a candidate solution of the problem. …”
Get full text
Get full text
Get full text
Article -
20
Discretization of crack propagation on parallel computing: complexity and parallel algorithms with source code
Published 2010“…The results obtained from the finite element approximation are presented graphically. …”
Get full text
Get full text
Get full text
Book
