Search Results - (( java implementation rsa algorithm ) OR ( basic identification based algorithm ))
Search alternatives:
- basic identification »
- identification based »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Basically, subspace identifications are based on algorithms from numerical algebras which are the QR decomposition and Singular Value Decomposition (SVD). …”
Get full text
Get full text
Get full text
Article -
7
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
8
Hazard identification on fractionation column using rule based expert system
Published 2001“…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
Get full text
Get full text
Article -
9
Simultaneous Computation of Model Order and Parameter Estimation of a Heating System Based on Gravitational Search Algorithm for Autoregressive with Exogenous Inputs
Published 2015“…Model order selection and parameter estimation are two significant aspects of determining the mathematical model for system identification. In this paper, an approach termed as Simultaneous Model Order and Parameter Estimation (SMOPE), which is basically based on Gravitational Search Algorithm (GSA), is proposed to combine these two parts into a simultaneous solution. …”
Get full text
Get full text
Get full text
Article -
10
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. …”
Get full text
Get full text
Get full text
Thesis -
11
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…This research presents an efficient way to facilitate the hearing loss symptoms diagnosis process by designing a symptoms identification model that efficiently identify hearing loss symptoms based on air and bone conduction pure-tone audiometry data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Model Identification Using Neuro-Fuzzy Approach
Published 2018“…Last section of the chapter deals with three different model training algorithms Least squares based, back-propagation and particle swarm optimization. …”
Get full text
Get full text
Article -
13
Model Identification Using Neuro-Fuzzy Approach
Published 2018“…Last section of the chapter deals with three different model training algorithms Least squares based, back-propagation and particle swarm optimization. …”
Get full text
Get full text
Article -
14
The identification of alcohol percentage limit in halal food using fuzzy logic
Published 2021“…As an alternative, fuzzy logic has been applied for the identification of the halal alcohol limit due to its advantages, including it is more economical (software-based), provide fast authentication and reliable. …”
Get full text
Get full text
Get full text
Book Chapter -
15
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Review of Wheat Disease Classification and Severity Detection Models
Published 2023“…This paper mainly aims to explain deep learning-based wheat diseases identification algorithm, and to discuss the benefits and drawbacks of present wheat disease detection approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Water Pollution Source Identification Based on Real-Time Monitoring System in Siak River
Published 2021Get full text
Get full text
Conference or Workshop Item -
18
Disposable Biomimetic Array Sensor Strip Coupled With Chemometric Algorithm For Quality Assessment Of Orthosiphon Stamineus Benth Samples
Published 2006“…A disposable screen printed array sensor strip based on self-plasticized methacrylate acrylate PVC blend lipid membranes combined with chemometric algorithm has been developed and applied for qualitative and quantitative analysis of O.stamineus samples. …”
Get full text
Get full text
Thesis -
19
Image reconstruction for liquid-gas regime identification based on multiple excitation sources in electrical resistance tomography system
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…The original FVRS developed only provides verification instead of identification. For identification, the image processing involves process of image pre-processing, feature extraction and classification. …”
Get full text
Get full text
Monograph
