Search Results - (( java implementation rsa algorithm ) OR ( using active utilizing algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- rsa algorithm »
- using active »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…This algorithm is based on two detection schemes; namely active and passive. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
Get full text
Get full text
Article -
8
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
9
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Two publicly activity datasets are used; Wireless Sensor Data Mining (WISDM) and Physical Activity Monitoring for Aging People (PAMAP2). …”
Get full text
Get full text
Thesis -
10
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Meanwhile, the case study validation activity resulting an increase in line efficiency from 92.7% to 95.1% by task arrangement with the utilization of TTA. …”
Get full text
Get full text
Thesis -
11
Integration of dual intelligent algorithms in shunt active power filter
Published 2013“…The effectiveness of the proposed dual intelligent algorithms is verified using Matlab/Simulink.…”
Get full text
Get full text
Conference or Workshop Item -
12
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…The experiment results show how these algorithms could be used to improve methods for recognizing human activities using wearables technology, such as feature selection, parameter adjustment, and model optimization.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Development of learning algorithm of passive joint for 3R under-actuated robot / Mohd Amiruddin Fikri Yaakob
Published 2015“…The experiment test-rig used in this study was a platform with two (2) DC motor for active (Active 1 and Active 2) joints and rotary digital encoder for acquiring real time output of position angle. …”
Get full text
Get full text
Thesis -
15
Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel
Published 2018“…The merging of these two methods enables the algorithm to distinguish between hand open and hand close activities by using sEMG signal collected by only one channel. …”
Get full text
Get full text
Conference or Workshop Item -
16
Fast multilayer color QR code decoder algorithm utilizing fuzzy technique
Published 2020“…In this paper, we propose a fast multilayer color QR code decoder algorithm to decode an extended color QR code. The extended color QR code utilize color reference for the color recognition. …”
Get full text
Get full text
Get full text
Article -
17
Nonlinear FXLMS algorithm for active noise control systems with saturation nonlinearity
Published 2012“…Furthermore, the modeling of the THF can be realized using least mean square (LMS) algorithm and utilized in the NLFXLMS control scheme. …”
Get full text
Get full text
Get full text
Article -
18
CSI-based human activity recognition via lightweight compact convolutional transformers
Published 2024“…The evaluation process of the proposed model utilizes self-collected dataset for CSI WiFi signals with few daily activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Active force control with iterative learning control algorithm for a vehicle suspension
Published 2013“…The simulation was conducted using MATLAB/Simulink software package whilstthe experimental study utilized the existing experimental rig with a hardware-in-the-loop simulation (HILS) configuration with the proposed ILC algorithms incorporated as the new research contribution. …”
Get full text
Get full text
Thesis -
20
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
Get full text
Get full text
Article
