Search Results - (( java implementation rsa algorithm ) OR ( changes estimation path algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- changes estimation »
- estimation path »
- path algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Development of real-time navigation system by using pure pursuit guidance for unmanned surface vehicle
Published 2024“…The Pure Pursuit algorithm works by focusing on the nearby path relative to the USV's position, guiding it with steering directions based on its current position and orientation. …”
Get full text
Get full text
Thesis -
8
-
9
Genetic algorithm for control and optimisation of exothermic batch process
Published 2013“…Although the proposed genetic algorithm controller (GAC) is able to regulate the process temperature to the desired path, it does not limit the waste production effectively. …”
Get full text
Get full text
Get full text
Thesis -
10
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
11
Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm
Published 2019“…It is very difficult to estimate the movement of the robot to avoid obstacles and choose the alternative path. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The Greedy Forwarding Strategy (GFS) has been the most used strategy in position-based routing protocols. The GFS algorithm was designed as a high-performance protocol that adopts hop count in soliciting shortest path. …”
Get full text
Get full text
Get full text
Thesis -
13
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…Firstly, an improved EM (IEM) algorithm is presented to estimate the five parameters of the single PV-module system. …”
Get full text
Get full text
Thesis -
14
Deep Reinforcement Learning Based Unmanned Aerial Vehicle (UAV) Control Using 3D Hand Gestures
Published 2022“…The evident change in the design of the autopilot system produced massive help for the aviation industry and it required frequent upgrades. …”
Get full text
Get full text
Article -
15
Development of mapping methods for seagrass meadows in Malaysia by using landsat images
Published 2015“…A statistical assessment and an evaluation of the twelve SLC-off and four SLCon images covering seagrass meadows of Sungai Pulai estuary, Johor, Malaysia were conducted for data loss estimates. This analysis revealed a 2% systematic error attributable to a gradual increase of SLC-off stripes from the central nadir path towards the edge of the scene. …”
Get full text
Get full text
Thesis
