Search Results - (( java implementation rsa algorithm ) OR ( using action method algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- method algorithm »
- rsa algorithm »
- action method »
- using action »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS
Published 2019“… PID Controllers have different algorithms or methods in which the controller action is based on Error or Process Variable (PV). …”
Get full text
Get full text
Final Year Project -
7
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
Get full text
Get full text
Article -
8
Revolutionizing video analytics: a review of action recognition using 3D
Published 2024“…As an interdisciplinary field, the 3D video action recognition model interprets human actions in three-dimensional video data using approaches such as pose-based, volumetric, motionbased, and hybrid methods. 3D video action recognition finds application in surveillance, sports analysis, human-computer interaction, healthcare, robotics, and augmented/virtual reality. …”
Get full text
Get full text
Article -
9
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
Get full text
Get full text
Thesis -
10
Simulation of an adaptive artificial neural network for power system security enhancement including control action
Published 2015“…This paper presents a new method for enhancing power system security, including a remedial action, using an artificial neural network (ANN) technique. …”
Get full text
Get full text
Get full text
Article -
11
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
12
Particle swarm optimization with deep learning for human action recognition
Published 2021“…This paper proposes a deep learning framework for human action recognition to overcome the drawbacks of the current state-of-the-art methods. …”
Get full text
Get full text
Article -
13
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. …”
Get full text
Get full text
Thesis -
14
Newton competitive genetic algorithm method for optimization the production of biochemical systems
Published 2018“…In this work, the optimization of biochemical systems production is performed by using a hybrid method of Newton competitive genetic algorithm is presented. …”
Get full text
Get full text
Article -
15
Property premises intruders detection using face recognition method / Joveni Henry
Published 2017“…Every property premises owner have already taken some action to protect their property premises and safety by using all kinds of methods. …”
Get full text
Get full text
Thesis -
16
The effectiveness of using the Lattice in multiplication skills among Year 5 in SK Beradek / Muhamad Shaharudin Muhamad Sarip
Published 2015“…This research focuses on efforts to help improve the skills of multiplication by using Lattice method among the pupils in Year 5 at SK Beradek. …”
Get full text
Get full text
Thesis -
17
Object Isolation In A Random Environment Using Manipulation Primitives Approach
Published 2019“…The algorithm was demonstrated using a KUKA Youbot with a camera fitted above the workspace. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A Newton Cooperative Genetic Algorithm Method for In Silico Optimization of Metabolic Pathway Production
Published 2015“…The NCGA used Newton method in dealing with the metabolic pathway, and then integrated genetic algorithm and cooperative co-evolutionary algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
20
Newton competitive genetic algorithm method for optimization the production of biochemical systems
Published 2018“…In this work, the optimization of biochemical systems production is performed by using a hybrid method of Newton competitive genetic algorithm is presented. …”
Get full text
Get full text
Get full text
Article
