Search Results - (( rendering optimization method algorithm ) OR ( program implementation rsa algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Optimization Of 3d Reconstruction Surface Rendering Algorithm For Osferion Bone Void Filling by Chin, Daniel Jie Yuan

    Published 2023
    “…Among the 3D reconstruction algorithms, surface rendering algorithms are more suitable for effectively visualizing the bones’ structure and shape. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Success history moth flow optimization for multi-goal generation dispatching with nonlinear cost functions by Alam, Mohammad Khurshed, Mohd Herwan, Sulaiman, Sayem, Md. Shaoran, Ringku, Md Mahfuzer Akter, Imtiaz, Shahriar, Khan, Rahat

    Published 2023
    “…The valve-point loading causes oscillations in the input-output characteristics of generating units, hence rendering the CEED problem an imperfect optimization problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Evaluating the Efficacy of Intelligent Methods for Maximum Power Point Tracking in Wind Energy Harvesting Systems by Umar D.A., Alkawsi G., Jailani N.L.M., Alomari M.A., Baashar Y., Alkahtani A.A., Capretz L.F., Tiong S.K.

    Published 2024
    “…These traditional methods in the standalone form are characterized by some drawbacks which render the method ineffective. …”
    Review
  12. 12

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Performance of 2-DOF PID controller in AGC of two area interconnected power system using PSO algorithm by Peddakapu, Kurukuri, Mohd Rusllim, Mohamed, Srinivasarao, P., Kishore, Dokala Janandra Krishna, Koteswararao, D.A., Swamy, P. S.P.R.

    Published 2022
    “…Therefore, in this work, particle swarm optimization (PSO) algorithm is formulated for tuning the gain values of the suggested controllers in multi-area interconnected system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Cuckoo optimised 2DOF controllers for stabilising the frequency changes in restructured power system with wind-hydro units by Peddakapu, K., M. R., Mohamed, M. H., Sulaiman, Srinivasarao, P., Kishore, D. J. K., P. K., Leung

    Published 2021
    “…Different types of metaheuristic optimisation methods like teaching–learning-based optimisation (TLBO) and cuckoo search algorithms are suggested to acquire the optimal gain values of the proposed controllers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Personalized one-shot local adaptation federated learning for mortality prediction in multi-center Intensive Care Unit by Deng, Ting

    Published 2024
    “…After conducting stepwise experiments and comparing with three benchmark methods - a baseline FL method and two PFL approaches in similar optimization scheme - the results shows that POLA not only systematically optimizes its internal outputs but also outperforms the comparison methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Intelligent traffic lights using Q-learning by Mohd Yusop, Muhammad Aminuddin, Mansor, Hasmah, Gunawan, Teddy Surya, Nasir, Haidawati,

    Published 2022
    “…The conventional traffic light system contributes to the safety of the road but is not an effective method of traffic control. The failure of traffic intersections to learn from their past mistakes has rendered them incapable of adapting to the dynamic changes in traffic flow. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Automated fault detection and extraction under gas chimneys using hybrid discontinuity attributes by Imran, Q.S., Siddiqui, N.A., Latiff, A.H.A., Bashir, Y., Khan, M., Qureshi, K., Al-Masgari, A.A.-S., Ahmed, N., Jamil, M.

    Published 2021
    “…The data optimization and conditioning processes are applied to suppress random and coherent noise first, and then a combination of seismic attributes is generated and co-rendered to enhance the discontinuities. …”
    Get full text
    Get full text
    Article