Search Results - (( java implementation rsa algorithm ) OR ( ((using function) OR (using active)) using algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using algorithm »
- using function »
- rsa algorithm »
- using active »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
Discrimination of pathological voices using systole activated neural network
Published 2012Get full text
Working Paper -
7
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Additionally, the proposed HFP+CI voltage control algorithm has resulted fastest response time; it is 94% faster than using the Fuzzy-PI voltage control algorithm and 6% faster than using the Crisp-PI voltage control algorithm.Hence, it can be concluded that the proposed algorithms have successfully performed their functions by effectively enhancing the operation of the SAPF.…”
Get full text
Get full text
Thesis -
8
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity
Published 2014“…An active method which has received much attention is the use of Active Noise Control (ANC) system which involves an electro acoustic system that cancels unwanted noise using the principle of superposition. …”
Get full text
Get full text
Thesis -
10
Performance of Multi-Layer Perceptron Neural Networks with an Exponential Decay Activation Function in Airwaves Estimation
Published 2013“…Logistic (sigmoid and tangent hyperbolic) and linear are the most used activation functions in practice for the Multi-Layer Perceptron (MLP) networks. …”
Get full text
Get full text
Citation Index Journal -
11
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…Subsequently, the THF modelling scheme can be incorporated into an established real time NLFXLMS algorithm termed THF-NLFXLMS algorithm. The developed THF-NLFXLMS algorithm is tested by means of simulation and implemented experimentally using FPGA-based real time controller for a nonlinear ANC application. …”
Get full text
Get full text
Thesis -
12
An improved artificial bee colony algorithm for training multilayer perceptron in time series prediction
Published 2014“…Furthermore, here these algorithms used to train the MLP on two tasks; the seismic event's prediction and Boolean function classification. …”
Get full text
Get full text
Get full text
Thesis -
13
Effort Estimation Model for Function Point Measurement
Published 2007“…The process starts with the planning phase activities and refined throughout the development. Various cost estimation models and methods are available to be used for software development process. …”
Get full text
Get full text
Thesis -
14
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…At the same time, there is no stated or predefined algorithm structure used for the street light control. …”
Get full text
Get full text
Monograph -
15
Nonlinear FXLMS algorithm for active noise control systems with saturation nonlinearity
Published 2012“…Furthermore, the modeling of the THF can be realized using least mean square (LMS) algorithm and utilized in the NLFXLMS control scheme. …”
Get full text
Get full text
Get full text
Article -
16
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…In recent works, it was shown that the SEF can be approximated using tangential hyperbolic function (THF) for Hammerstein and Wiener NLFXLMS algorithms, such that the degree of nonlinearity can be estimated using modelling approach. …”
Get full text
Get full text
Thesis -
17
Gps solution for active queue management using android platform
Published 2021“…Tools used to develop the project is Android Studio with Google Firebase as database of this project. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Loudspeaker nonlinearity compensation with inverse tangent hyperbolic function-based predistorter for active noise control
Published 2014“…Simulation results show that using the proposed PD along with the FXLMS algorithm increase the noise reduction performance significantly. …”
Get full text
Get full text
Get full text
Article -
19
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
Get full text
Get full text
Get full text
Thesis -
20
Modelling of biogas production process with evolutionary artificial neural network and genetic algorithm
Published 2017“…One of the issues of ANN implementation is to correctly select the output activation function in achieving higher output. The EANN used a modified activation function to meet the optimisation requirement. …”
Get full text
Get full text
Thesis
