Search Results - (( using combination force algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- force algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
7
Optimizing BOINC scheduling using genetic algorithm based on thermal profile
Published 2014“…We use genetic algorithm to find the best combination of clients and jobs based on clients order and least execution time. …”
Get full text
Get full text
Conference or Workshop Item -
8
Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy
Published 2015“…In order to combine my hardware and software together, I have been written a PID algorithm in LabVIEW which can be communicate with the NI ELVIS to the piezoelectric buzzer to achieve Z motion control in atomic force microscopy.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Hybrid genetic algorithms are the combination of learning algorithms(Back propagation), usually working as evaluation functions, and genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System
Published 2021“…The proposed method has three steps: preprocessing, feature selection and classification. Several combinations of Harmony search algorithm, genetic algorithm, and particle swarm optimization algorithm are examined with K-means for feature selection. …”
Get full text
Get full text
Get full text
Article -
12
Fuzzy-PID controller for semi-active vibration control using magnetorheological fluid damper
Published 2012“…In this paper, the behavior of MR damper is studied and used in implementing vibration control. The force-displacement and force-velocity response with varying current has been established for the MR damper. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Crowd behavior monitoring using self-adaptive social force model
Published 2019“…This work aims to develop a crowd behavior monitoring system using Self-Adaptive SFM. This algorithm is jointly used with Horn-Schunck optical flow as a motion detector for the input video. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Inelastic analysis of composite sections
Published 2004“…This paper describes the development of a numerical algorithm used for the inelastic analysis of composite sections subjected to combined axial force and bending moment. …”
Get full text
Get full text
Get full text
Article -
15
Natural gas liquid (NGL) distillation process using driving force and thermal pinch analysis methods: Energy and economic assessment / Munawar Zaman Shahruddin ... [et al.]
Published 2020“…Then, the extracted data from the simulation will be used for thermal pinch analysis via problem table algorithm (PTA). …”
Get full text
Get full text
Article -
16
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The strength of the keys and ciphertext are compared with the Advanced Encryption Standard (AES), HiSea, and Dynamic Key Schedule Algorithm (DKSA). The proposed KSAHC algorithm has been validated using the randomness test proposed and recommended by NIST, the average result of avalanche test is 93%, entropy is 0.9968, correlation assessment test is -0.000601 and having large key space 2.70 × 1067 keys that makes the Brute Force attack difficult and time-consuming. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Design and development of prototype robot gripper for object weight measurement
Published 2014“…A few technologies have been used different types of sensors in order to measure the forces between the claw of robotic gripper and an object. …”
Get full text
Get full text
Thesis -
18
Refinement of Tuned Mass Damper parameters on machine support structure using dynamic Cuckoo Search algorithm
Published 2025“…The research aims to optimize key TMD parameters (mass ratio, damping ratio, and frequency ratio) using the dynamic CS algorithm. The performance of this algorithm will be evaluated by comparing it to the computed values in literature, especially from the Den Hartog formula. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Modeling And Optimization Of Physical Vapour Deposition Coating Process Parameters For Tin Grain Size Using Combined Genetic Algorithms With Response Surface Methodology
Published 2015“…Additionally,analysis of variance(ANOVA) was used to determine the significant factors influencing resultant TiN coating grain size.Based on that,a quadratic polynomial model equation was developed to represent the process variables and coating grain size.Then,in order to optimize the coating process parameters, genetic algorithms (GAs) were combined with the RSM quadratic model and used for optimization work.Finally,the models were validated using actual testing data to measure model performances in terms of residual error and prediction interval (PI).The result indicated that for RSM,the actual coating grain size of validation runs data fell within the 95% (PI) and the residual errors were less than 10 nm with very low values, the prediction accuracy of the model is 96.09%.In terms of optimization and reduction the experimental data,GAs could get the best lowest value for grain size then RSM with reduction ratio of ≈6%, ≈5%, respectively.…”
Get full text
Get full text
Get full text
Article -
20
Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm
Published 2024“…Therefore, this paper aims to obtain optimum conditions of ethe nd milling process for three cutting inserts with multi-objective parameters using a combination of mathematical modelling and genetic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
