Search Results - (( program angle ((method algorithm) OR (path algorithm)) ) OR ( java application rsa algorithm ))
Search alternatives:
- method algorithm »
- java application »
- application rsa »
- path algorithm »
- program angle »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Path Following Using A Learning Neural Network
Published 2004“…The thesis differs from [2] in a sense that different types of neural controller are established to achieve a better path following accuracy. Two algorithms, gradient descent and quasi-Newton which utilize a batch training method, are introduced as comparison to the gradient descent method that incorporates the online (or incremental) training method. …”
Get full text
Get full text
Final Year Project -
4
Development of real-time navigation system by using pure pursuit guidance for unmanned surface vehicle
Published 2024“…The Pure Pursuit algorithm works by focusing on the nearby path relative to the USV's position, guiding it with steering directions based on its current position and orientation. …”
Get full text
Get full text
Thesis -
5
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
7
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
8
Implementation of an autonomous mobile robot navigation algorithm using C language
Published 2009“…From the encoder programming to the motor speed control, this project basically focusing on how to control the motor speed movement such as rotation speed, turning speed, turning angle of the robot by controlling the movement of the motor and distance travel or displacement of the mobile robot from initial point to end point through some path that required turning algorithm and forward movement in controlled speed.…”
Get full text
Get full text
Final Year Project -
9
A Feasible Architecture Of Real-Time Collision Avoidance And Path Planning For Semi-Autonomous Unmanned Ground Vehicle (Ugv)
Published 2018“…Therefore, APM is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
Get full text
Get full text
Monograph -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
Development of learning algorithm of passive joint for 3R under-actuated robot / Mohd Amiruddin Fikri Yaakob
Published 2015“…The approach embedded Artificial Neural Network (ANN) algorithm and SIMULINK block diagram. Experiments were conducted to predict an algorithm on position angle measurement either SIMULINK block diagram or program code method applied to three joints; Active 1, Active 2 and Passive respectively. …”
Get full text
Get full text
Thesis -
12
Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom
Published 2018“…The second objective is the development of an alternative simulation approach using generative algorithm. A generative modeling tool using visual programming editor Grasshopper® which provides a more realistic simulation tool by incorporating the kinematic property of the origami was developed. …”
Get full text
Get full text
Thesis -
13
-
14
The assessment and improvement of angle stability condition of the power system using particle swarm optimization (PSO) technique / Nor Azwan Mohamed Kamari
Published 2016“…An efficient optimization method using PSO for synchronizing torque coefficients Ks and damping torque coefficients Kd to solve angle stability problems was developed and used to identify the angle stability condition on single and multi machine system. …”
Get full text
Get full text
Thesis -
15
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…Therefore, controller is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
Get full text
Get full text
Monograph -
16
Differential equation fault location algorithm with harmonic effects in power system
Published 2023“…In this study, several filters were tested to obtain the lowest fault location error to reduce the effect of harmonic components on the developed fault location algorithm. The network model is simulated using the alternate transients program (ATP)Draw simulation program. …”
Get full text
Get full text
Get full text
Article -
17
The assessment and improvement of angle stability condition of the power system using particle swarm optimization (PSO) technique / Nor Azwan Mohamed Kamari
Published 2017“…An efficient optimization method using PSO for synchronizing torque coefficients Ks and damping torque coefficients Kd to solve angle stability problems was developed and used to identify the angle stability condition on single and multi machine system. …”
Get full text
Get full text
Book Section -
18
Parallel Block Methods for Solving Ordinary Differential Equations
Published 2004“…The parallel programs were run on a Sequent Symmetry SE30 parallel computer.The Cq stability in the multistep method was introduced and the focused was on the error propagation from a more practical angle. …”
Get full text
Get full text
Thesis -
19
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020“…This thesis provided a detailed method in implementing the algorithm for face and person recognition by using haar cascade classifier feature detection and contour approximation. …”
Get full text
Get full text
Monograph -
20
Finite Element Modeling Of Ballistic Penetration into Fabric Armor
Published 2006Get full text
Get full text
Thesis
