Search Results - (( java implementation rsa algorithm ) OR ( parameter estimation conversion algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Optimization of Lipase Catalysed Synthesis of Sugar Alcohol Esters Using Taguchi Method and Neural Network Analysis by Adnani, Seyedeh Atena

    Published 2011
    “…Subsequent quantitative studies on main effects of parameters governing the reactions based on conversion of fatty acid were conducted by titration analysis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Variable Speed Control Of Two-Mass Wind Turbine System Via State Feedback With Adaptation Law by Mohamad Murad, Nor Syaza Farhana

    Published 2018
    “…According to the findings of the adaptation law,the algorithm can be adapted to various stiffness value in consequence of the estimated stiffness value.In conclusion,the optimum TSR and output power are acquired through the proposed controlled rotor speed.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Grey wolf optimization for enhanced performance in wind power system with dual-star induction generators by Benamara K., Amimeur H., Hamoudi Y., Abdolrasol M.G.M., Cali U., Ustun T.S.

    Published 2025
    “…These algorithms play a crucial role in estimating the optimal values of Kp, Ki, and Kd for the PID speed controller, as well as Kp and Ki for the PI controller used in the flux, DC-link voltage, and grid connection for wind energy conversion system based dual-star induction generator. …”
    Article
  13. 13
  14. 14

    Extended Kalman Filter (EKF)-based modular-stack Vanadium Redox Flow Battery (V-RFB) prediction model development for reducing electrode contact resistance and parallelization curr... by Mohamed, Mohd Rusllim

    Published 2019
    “…Extended Kalman Filter (EKF) is used for parameter estimation for both circuit. Actual and approximate circuit are derived accordingly. …”
    Get full text
    Get full text
    Research Report
  15. 15

    Modeling And Optimization Of Lipase-Catalyzed Synthesis Of Adipate Esters Using Response Surface Methodology And Artificial Neural Network by Langroodi, Naz Chaibakhsh

    Published 2010
    “…Various feedforward neural networks were performed using different learning algorithms. The best algorithm was found to be Levenberg–Marquardt (LM) for a network composed of seven hidden nodes with hyperbolic tangent sigmoid transfer function. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Blind Source Separation Using Two-Dimensional Nonnegative Matrix Factorization In Biomedical Field by Toh, Cheng Chuan

    Published 2018
    “…Theoretically,β and α is parameters that used to vary the NMF2D algorithm in order to yield high SDR value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…This helps to facilitate semi-skillful users to implement the tree counting algorithms. Users are required to input three parameters which are, image resolution, planting distance of oil palm trees as well as the diameter of oil palm crown, in order to operate the interface. …”
    Get full text
    Get full text
    Thesis