Search Results - (( java implementation rsa algorithm ) OR ( using practical drops algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using practical »
- rsa algorithm »
- drops »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Dijkstra’s Algorithm for optimal recyclable waste collection system in Port Dickson / Nur Jazlina Mohd Iszairi, Aina Zulaika Md Ramli and Nursabrina Saifulbahri
Published 2023“…Moreover, waste collection and transportation problems are among the difficult operational problems. A practical recyclable waste collection system would optimize the Waste Management System (WMS), especially in route choice from Depot to each drop-off collection center. …”
Get full text
Get full text
Student Project -
7
AntNet: a robust routing algorithm for data networks
Published 2004“…The performance matrix used to compare the algorithms is based on average throughput, packet loss, packet drop and end-to-end delay. …”
Get full text
Get full text
Get full text
Article -
8
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
Get full text
Get full text
Get full text
Thesis -
9
Benchmark simulator with dynamic environment for job scheduling in grid computing
Published 2014“…Characteristics of jobs and resources to be used in evaluating the performance of the scheduling algorithm must reflect the dynamic nature of real grid environment.Static models of jobs and resources cannot be used to generate jobs and resources in simulating the grid environment because of the dynamic nature of the grid.This paper presents a new graph representation of jobs and resources which is practical for hybrid metaheuristic model implementation such as ant colony optimization and genetic algorithm.A dynamic model that can generate jobs and resources similar to the jobs and resources in the real grid environment is also proposed.Jobs and resources may join in or drop out from the grid.Stochastic analysis is performed on the characteristics of jobs and resources.A simulator based on the dynamic expected time to compute, has been developed and can be used as a benchmark.The simulator can generate jobs and resources with the characteristics of jobs and resources in the real grid environment.This will facilitates the evaluation of dynamic job scheduling algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
11
High Viscous Fluid Transport Model
Published 2004“…For high viscous fluid, failure to account for radial variations in liquid viscosity may cause the pipeline pressure drop to be grossly under predicted. The procedures and techniques in modeling of the viscous fluid have been developed, and applied to real life practices. …”
Get full text
Get full text
Final Year Project -
12
Impact of BPL penalty functions and PSF models in PET/CT radial spatial resolution recovery
Published 2024“…A capillary tube was used to draw the selected drop, creating the point source with volume 1 mm3. …”
Get full text
Get full text
Monograph -
13
Optimizing the light gradient-boosting machine algorithm for an efficient early detection of coronary heart disease
Published 2024“…Borderline-SMOTE (Synthetic Minority Over-sampling Technique) was used on the training set to balance the dataset. …”
Get full text
Get full text
Get full text
Article -
14
Instrumentation Monitoring For Heavy Metal Detection In Batik Industry
Published 2019“…This study proposes the development of instrument device to real-time monitoring heavy metal using an electroanalytical technique. This project introduced mathematical algorithm to represent the existing metal concentration in the solution based on statistical analysis from the data collection using laboratory control sample. …”
Get full text
Get full text
Monograph -
15
Automatic mapping of concrete strength in structural element
Published 2006“…Signal-processing techniques were used to compute the data; Fourier Transform to translate a time-series signal into frequency domain, concrete strength calculation, interpolation technique and a Graphic User Interface (GUI) to complete the mapping algorithms.…”
Get full text
Get full text
Conference or Workshop Item -
16
Development of a lower-extremities exoskeleton for postural-sway in sit-to-stand movement
Published 2025“…The system integrates an ESP32 microcontroller, IMU-based sway detection, and a threshold-based control algorithm for real time actuation. The fully assembled prototype was evaluated in 15 subjects across varying stance (normal, tandem) and visual (eyes open/closed) conditions using surface electromyography (sEMG) and centre of pressure (CoP) metrics. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem
Published 2024“…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
Get full text
Get full text
Get full text
Article -
18
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
Get full text
Get full text
Get full text
Article -
19
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Furthermore, it achieved approximately 50 Frames per Second (FPS) using a live camera, meeting the real-time detection requirements. …”
Get full text
Get full text
Thesis -
20
An In-depth Study of Ankle-Foot Orthosis Dynamics Modeling: Leveraging Non-Parametric Approach Via Artificial Neural Networks
Published 2024“…Patients that have abnormal walking gait are caused by foot drops, strokes, and other disabilities. Ankle-foot orthosis (AFO) are widely used to provide practical assistance for patients with injuries or defects in the lower limbs. …”
Get full text
Get full text
Get full text
Proceeding
