Search Results - (( java implementation rsa algorithm ) OR ( using patterns path algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using patterns »
- path algorithm »
- rsa algorithm »
- patterns path »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
7
Scheduling of batch process plant / Abdul Aziz Abu Bakar
Published 1995“…This research work is devoted to software development of scheduling and control algorithm of batch process plant using shortest path method developed by Dijkstra and K* shortest path method developed by Jin Y. …”
Get full text
Get full text
Student Project -
8
Animal voice recognition for identification (ID) detection system
Published 2011“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
9
Dog voice identification (ID) for detection system
Published 2012“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…The repeatability tests shown that the developed navigation algorithm able the robot to reach the target with the similar navigation path pattern outcome in each simulation tests. …”
Get full text
Get full text
Thesis -
11
Destination prediction based on past movement history
Published 2020“…The results are promising and we also look at the combination of variables to use for such a use case.…”
Get full text
Thesis -
12
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…Based on the concept, pheromone saturation is used to combine stackable solution pattern that is discovered while straying to different term node to build a path. …”
Get full text
Get full text
Thesis -
13
NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition
Published 2006“…The speaker recognition is performed using the back-propagation neural network (BPNN) algorithm to enhance the recognition performance. …”
Get full text
Get full text
Article -
14
Path Planning Optimization For Solar-Powered Perpetual Flight Across The World
Published 2018“…The successful flight pattern done by (Tan) which has covered latitude of ±66 ºat various longitude is used in this research with the attempt to reach the global coverage. …”
Get full text
Get full text
Monograph -
15
New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions
Published 2022“…The proposed Trapezoidal rule based P&O algorithm is evaluated under three conditions: (1) under uniform irradiance (2) under shading conditions and (3) under sudden and step changes in irradiation levels as well as the transition between shading patterns. …”
Get full text
Get full text
Article -
16
New reflector shaping methods for dual-reflector antenna
Published 2022“…The accuracy of MATLAB program is ensured from the obtained ray path results, aperture distribution and radiation pattern. …”
Get full text
Get full text
Article -
17
Local DTW coefficients and pitch feature for back-propagation NN digits recognition
Published 2006“…The speech recognition is performed using the back-propagation neural network (BPNN) algorithm to enhance the recognition performance. …”
Get full text
Conference or Workshop Item -
18
Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom
Published 2018“…Six tessellation origami models consisting of three variations of Miura-ori, Russo’s Optical Illusion, Yoshimura and Ron Resch pattern were selected to investigate the transformation under different paths using the generative modeling tool. …”
Get full text
Get full text
Thesis -
19
Enhanced verbalization of ORM models
Published 2012“…Thirdly, it provides an algorithm for verbalizing external uniqueness and frequency constraints over roles projected from join paths of arbitrary complexity. …”
Get full text
Get full text
Teaching Resource -
20
Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition
Published 2006“…The speech recognition is performed using the back-propagation neural network (BPNN) algorithm to enhance the recognition performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
