Search Results - (( java implementation rsa algorithm ) OR ( program identification method algorithm ))
Search alternatives:
- identification method »
- java implementation »
- implementation rsa »
- method algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
7
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
8
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…This research has produced filtered back concentration profiles of each flow regimes owing to the technique of neural network method of flow regime identification.…”
Get full text
Get full text
Thesis -
9
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
10
Simultaneous Network Reconfiguration and DG Sizing Using Evolutionary Programming and Genetic Algorithm to Minimize Power Losses
Published 2014“…This paper presents an effective method based on Evolutionary Programming (EP) and Genetic Algorithm (GA) to identify the switching operation plan for feeder reconfiguration and distributed generation size simultaneously. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods
Published 2017“…Besides that, a constrained non-linear programming method for FIS modelling is suggested, as a variant of the system identification method.…”
Get full text
Get full text
Get full text
Article -
13
Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems
Published 2021“…To examine and validate the proposed methodology, various fault types in a sample power system are simulated by using the electromagnetic transient program (EMTP). The simulation results reveal that the proposed methods demonstrate a high success rate of fault-location identification in power transmission networks for NIFM applications.…”
Get full text
Get full text
Get full text
Article -
14
-
15
Biometrics: Facial Recognition
Published 2004“…It also lists the various approaches in handling facial recognition where we see different methods applied and opinions on which method is better and what factors influenced them. …”
Get full text
Get full text
Final Year Project -
16
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Validation against conventional methods and state-of-the-art algorithms confirmed the superior performance of the proposed approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems
Published 2020“…To examine and validate the proposed methodology for constructing power transmission networks, various fault types are simulated by using electromagnetic transients program (EMTP). The simulation results are achieved to reveal that the proposed methods demonstrate a high success rate of fault location identification in power transmission networks for NIFM applications.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…After that, a hybrid of MLFNN with other optimization methods was introduced, i.e. Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
Get full text
Get full text
Thesis -
20
Detecting cholesterol presence using iris recognition algorithm
Published 2010Get full text
Working Paper
