Search Results - (( java implementation rsa algorithm ) OR ( knowledge integration system algorithm ))
Search alternatives:
- knowledge integration »
- java implementation »
- implementation rsa »
- integration system »
- system algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…The testing and training of such system prior to deployment must be thorough. As an alternative, having a self-learning algorithm embedded in an autonomous system allows the system to instinctively acquire new knowledge and learn from experience. …”
Get full text
Get full text
Thesis -
7
Discovering association rules for mining images datasets: a proposal
Published 2005Get full text
Get full text
Conference or Workshop Item -
8
Enhanced Hopfield Neural Networks With Artificial Immune System Algorithm For Satisfiability Logic Programming
Published 2017“…Hence, a robust intelligence system that integrates the Hopfield neural network and metaheuristic paradigm is constructed to extract the data set hidden knowledge in the form of 3-Satisfiability logical rule. …”
Get full text
Get full text
Thesis -
9
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…Such RERs integration phenomenon compromised the existing protection relaying scheme operation settings due to the power grid system topology changes. …”
Get full text
Get full text
Thesis -
10
-
11
Integrated Mobile Spain Model Using Artificial Immune System Algorithms
Published 2024Proceedings Paper -
12
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…The inspired honeybee’s behavior was designed based on the integration of knowledge of charging station, remaining energy and environment with static and dynamic obstacles. …”
Get full text
Get full text
Thesis -
13
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The model limitation is in retraining for new knowledge with changes in the power system network topology and lacks robustness. …”
Get full text
Get full text
Thesis -
14
-
15
Comparative study of fuzzy logic controller and proportional integral derivative controller on DC-DC buck converter / Muhammad Jamhuri Yusoff
Published 2010“…Fuzzy logic controller has been implemented to the system by developing fuzzy logic control algorithm. …”
Get full text
Get full text
Thesis -
16
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
17
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
18
-
19
-
20
Development of a Mobile Robot Local Navigation System Based on Fuzzy-Logic Control and Actual Virtual Target Switching
Published 2006“…While the fuzzy logic body of the algorithm performs the main tasks of obstacle avoidance, target seeking, and speed adjustment, an actual-virtual target switch strategy integrated with the fuzzy logic algorithm enables the robot to show wall following behavior when needed. …”
Get full text
Get full text
Thesis
