Search Results - (( java application rsa algorithm ) OR ( based observational method algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Disturbance-Kalman state for linear offset free MPC by Tuan, T.T., Zabiri, H., Mutalib, M.I.A., VO, D.-V.N.

    Published 2022
    “…Based on the drawbacks observed in those methods, a novel algorithm is proposed to guarantee offset-free MPC under model-plant mismatches and disturbances by combining the two proposed methods which are the proposed Recursive Kalman estimated state method and the proposed Disturbance-Kalman state method. …”
    Get full text
    Get full text
    Article
  8. 8

    Research On Photovoltaic Mppt Control Method Based On Improved Bas Algorithm And Variable Step-Size Inc Method by Li, Wenli

    Published 2024
    “…Commonly used control methods include CVT method, perturbation and observation method, and incremental conductance method. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…In this work, the perturb and observation (P&O) method based on duty cycle adjustment is introduced, which is modified to increase speed of the search and also to reduce the oscillation.The simulation and experimental works have been performed to investigate behavior and performance of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity by Khameneh, Azadeh Zahedi, Ghaznavi, Mehrdad, Kilicman, Adem, Mahad, Zahari, Mardani, Abbas

    Published 2024
    “…The clustering results are analyzed based on several indexes. This analysis shows the efficiency of the proposed algorithm compared to the traditional clustering methods. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.…”
    Get full text
    Get full text
    Article
  12. 12

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The performance of k-means clustering method based on robust principal components by Kadom, Ahmed, Midi, Habshah, Rana, Sohel

    Published 2018
    “…The k-means clustering method is the most widely used method to group n observations into k clusters. …”
    Get full text
    Get full text
    Article
  14. 14

    Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation by Eissa, Magdy Abdullah, Sali, Aduwati, Ahmad, Faisul Arif, Darwish, Rania R.

    Published 2021
    “…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
    Get full text
    Get full text
    Article
  15. 15

    Power Stabilization Of A Stand-Alone Solar System Using Perturb and Observe MPPT Algorithm by Kamarudin, Muhammad Nizam, Jamri , Mohd Saifuzam

    Published 2010
    “…This paper presents the method of power stabilization of a stand-alone solar system using perturb and observe (P&O) maximum power point algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Investigating the Performance of Deep Reinforcement Learning-Based MPPT Algorithm under Partial Shading Condition by Yew W.H., Fat Chau C., Mahmood Zuhdi A.W., Syakirah Wan Abdullah W., Yew W.K., Amin N.

    Published 2024
    “…In this study, MATLAB models of a DRL-based MPPT algorithm were developed, tested, and compared to simulation based on two established MPPT algorithms-the Particle Swarm Optimization (PSO), and the Perturb and Observe (P&O). …”
    Conference Paper
  20. 20

    Regionalization by fuzzy expert system based approach optimized by genetic algorithm. by Chavoshi, Sattar, Sulaiman, Wan Nor Azmin, Saghafian, Bahram, Sulaiman, Md. Nasir, Abd Manaf, Latifah

    Published 2013
    “…In recent years soft computing methods are being increasingly used to model complex hydrologic processes. …”
    Get full text
    Get full text
    Article