Search Results - (( safety implementation using algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- safety implementation »
- implementation using »
- java application »
- using algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Car plate recognition system : (segmentation)
Published 2005“…In the research,One Pass Thinning algorithm and Partial Segmentation algorithm are the algorithms being applied.For each phase,the used technique produces quite a good result whereby it is to be discussed in detail in the thesis.…”
Get full text
Get full text
Undergraduates Project Papers -
7
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…The RASH algorithm is defined by overall risk, which is equivalent to the sum of Risk Safety Safety, Risk Safety Health, Risk Health Safety, and Risk Health Health. …”
Get full text
Get full text
Thesis -
8
Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli
Published 2023“…In Malaysia, this requirement is outlined in Standard Operation Procedure (SOP) manuals, which specify the mandatory use of seven types of PPE: hard hat, safety goggle, hi-vis vest, safety shoes, gloves, respirator, and earplugs. …”
Get full text
Get full text
Thesis -
9
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…The improved algorithm is used to obtain the rough obstacle avoidance of the vehicle. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
10
Lithium-Ion Battery Charge Equalization Algorithm for Electric Vehicle Applications
Published 2023Article -
11
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Implementation Of Algorithm For Vehicle Anti-Collision Alert System In FPGA
Published 2017“…This paper presents the development and implementation of an algorithm to be utilized for vehicle anti-collision alert system, which may be useful to reduce the occurrence of accidents. …”
Get full text
Get full text
Get full text
Article -
13
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
14
Real-time safety helmet detection using enhanced YOLOv5 object detection
Published 2023“…Extensive research was conducted to analyze all feasible algorithms that can be implemented in the safety helmet detection system and compare the proposed model with an existing one to ensure the proposed system can give high accuracy and high inference speed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman
Published 2010“…Our approaches ensure that algorithm and real-time control operations give safety requirements for the system. …”
Get full text
Get full text
Thesis -
17
Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and...
Published 2007“…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. Multiple Signal Classification (MUSIC). …”
Get full text
Get full text
Thesis -
18
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
19
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Case driven TLC model checker analysis in energy scenario
Published 2023“…To foster the functional safety of corresponding program-algorithmic solutions, the model checking techniques and related tools are applied to the formal specifications of named solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
