Search Results - (( java implementation rsa algorithm ) OR ( parameter estimation connection algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm by Natsheh, Essam Fathi

    Published 2006
    “…These applications are: route lifetime estimation, local connectivity management, nodes affinity management, and active queue management. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Sensorless Adaptive Fuzzy Logic Control Of Permanent Magnet Synchronous Motor by Hafz Nour, Mutasim Ibrahim

    Published 2008
    “…Both experimental and simulation results obtained from the HMRASC and the position angle estimation algorithms showed superior results compared to other methods presented in the literature.…”
    Get full text
    Get full text
    Thesis
  10. 10

    RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION by CATUR ANDRYANI, NUR AFNY

    Published 2010
    “…The proposed training algorithms discussed in this thesis are derived for fixed size RBF network and being compared with Extreme Learning Machine (ELM) as the ELM technique just randomly assigned centers and width of the hidden neurons and update the output connected weights. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…In addition, the ADAPSO position update equation is modified to anticipate position adjustment to ensure communication connectivity. To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Control algorithm for two-tank system using multiparametric programming by Zakaria, A., Mid, E.C., Mohamed, M.F., Hussin, M.H.M., Shaari, A.S., Ruslan, Eliyana, Hadi, Dayanasari, Masri, M.

    Published 2023
    “…Results show accurate and robust regulation of liquid levels, minimizing control effort and making it suitable for systems with dynamic variations or parameter uncertainties. In conclusion, the implementation of multiparametric programming is able to estimate the value of the output for the control algorithm of the two-tank system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Reliability performance evaluation and integration of routing algorithm in shuffle exchange with minus one stage by Md Yunus, Nur Arzilawati

    Published 2012
    “…These routing algorithms are Zero X, Zero Y, ZeroYbit, ZeroXbit, Sequential Increasing and Sequential Decreasing Algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Diagonalization of covariance matrix in simultaneous localization and mapping of mobile robot by Maziatun, Mohamad Mazlan, Nur Aqilah, Othman, Hamzah, Ahmad

    Published 2019
    “…The multiplications of the covariance matrix with other parameters will cause the increments of its dimension, which is twice the number of landmarks and result in erroneous estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Grey wolf optimization for enhanced performance in wind power system with dual-star induction generators by Benamara K., Amimeur H., Hamoudi Y., Abdolrasol M.G.M., Cali U., Ustun T.S.

    Published 2025
    “…These algorithms play a crucial role in estimating the optimal values of Kp, Ki, and Kd for the PID speed controller, as well as Kp and Ki for the PI controller used in the flux, DC-link voltage, and grid connection for wind energy conversion system based dual-star induction generator. …”
    Article
  16. 16

    Bayesian logistic regression model on risk factors of type 2 diabetes mellitus by Chiaka, Emenyonu Sandra

    Published 2016
    “…The significant variables determined by maximum likelihood method were then estimated using the BLR method. The BLR approach via Gibbs sampler and the random walk metropolis algorithm suggests that family history of diabetes, waist circumference and the body mass index are the significant risk factors associated with the type 2 diabetes mellitus. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Reproducing kernel Hilbert space method for cox proportional hazard model by Abdul Manaf, Nur'azah

    Published 2016
    “…This algorithm is used to determine the vector i a that enables us to find the optimal parameters of ƒ(x)which is simplified as F(x)= ∑aᵢK(x,xᵢ) . …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The prior result from the Matlab model of the adaptive numerical distance relay connected on midpoint integrated STATCOM power grid system indeed establish the existence of the under-reach effect for the relay zone-3 elements ing far-end short circuit fault at the coverage boundary leading to wrong impedance estimation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…By minimizing integral square errors, fractional order model parameters were optimized (ISE). The results reveal that the better the precision of the modelling cupping system parameter, the lower the error. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20