Search Results - (( java application rsa algorithm ) OR ( using practice based algorithm ))
Search alternatives:
- java application »
- application rsa »
- using practice »
- practice based »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems
Published 2011“…Instead of solving the original optimal control problem, the model-based optimal control problem is solved. The algorithm developed in this thesis contains three sub-algorithms. …”
Get full text
Get full text
Thesis -
7
Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei
Published 2017“…Numerical simulations are used to prove the effectiveness of these algorithms compared with other existing power control algorithms. …”
Get full text
Get full text
Get full text
Thesis -
8
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…For real-world practicality, Garner’s algorithm is efficient to speed up the CRT computation. …”
Get full text
Get full text
Get full text
Article -
9
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…Subsequently, the THF modelling scheme can be incorporated into an established real time NLFXLMS algorithm termed THF-NLFXLMS algorithm. The developed THF-NLFXLMS algorithm is tested by means of simulation and implemented experimentally using FPGA-based real time controller for a nonlinear ANC application. …”
Get full text
Get full text
Thesis -
10
-
11
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…The research anticipates significant contributions to algorithmic solutions, utilizing Python-based experiments aligned with Software Engineering practice, providing practical insights for routing optimization in automated warehouses. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Design/methodology/approach – In this study, flight data were collected and analyzed; MATLAB-based system identification algorithm was developed using DE and PEM; parameterized state-space model parameters were estimated using the developed algorithm and model dynamic analysis. …”
Get full text
Get full text
Get full text
Article -
13
Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms
Published 2014“…As a solution to the above mentioned issues, four new distance methods have been proposed in this thesis, which are based on the rows of a feature matrix of 2DPCA-based algorithms. …”
Get full text
Get full text
Thesis -
14
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…In this paper, we propose a generalized RBF (GRBF) model to reduce the number of basis functions and thus alleviate curse of dimensionality. An EM-based training algorithm is also introduced, which uses fewer parameters compared to some classical supervised learning methods. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
Get full text
Get full text
Thesis -
16
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)
Published 2019“…This paper proposes Opposition-based Whale Optimization Algorithm (OWOA) to optimize solution problem in 0/1 Knapsack. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki
Published 2021“…Therefore, the purpose of this study is to facilitate the use of Forward Chaining Algorithm to calculate Faraid based on inheritance division. …”
Get full text
Get full text
Student Project -
18
Daisy species classification based on image using Convolutional Neural Network algorithm / Haris Hidayatullah Khaimuza
Published 2024“…Second objective is to develop the prototype of daisy species classification based on image using CNN algorithm. The last objective is to evaluate the accuracy of CNN model in the daisy species classification based on image. …”
Get full text
Get full text
Thesis -
19
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The results of the practicality test show that this VR product is practical to use based on the indicators of convenience, attractiveness, efficiency, and benefits. …”
Get full text
Get full text
Get full text
Article -
20
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis
