Search Results - (( variable application system algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…This work is interested in proposing an observer with fuzzy variable gains for a general nonlinear system. Furthermore, a linear model has been built to facilitate the accomplishment of the fault detection of the industrial servo system by using the proposed observer. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Cuckoo search algorithm as an optimizer for optimal reactive power dispatch problems by M. H., Sulaiman, Zuriani, Mustaffa

    Published 2017
    “…This paper presents the application of Cuckoo Search Algorithm (CSA) in optimizing the control variables of power system operation in solving the optimal reactive power dispatch (ORPD) problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data by Rana, M.M., Rahman, A., Uddin, M., Sarkar, M.R., Shezan, S.A., Ishraque, M.F., Rafin, S.M.S.H., Atef, M.

    Published 2022
    “…An isolated microgrid (IMG) system is an independent limited capacity power system where the peak shaving application can perform a vital role in the economic opera-tion. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Modification of a commercial PWM sprayer control system for precision farming application by Shahemabadi, Ali Rafiei, Moayed, Majid Javid

    Published 2008
    “…The variable-rate control system consisted of pulse width modulation (PWM) solenoids, a by pass control valve, and nozzle control system interfaced to a computer. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Identification of continuous-time hammerstein model using improved archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad, Cho, Bo Wen

    Published 2024
    “…Although various optimization algorithms have been widely employed in multiple applications, the traditional Archimedes optimization algorithm (AOA) has presented imbalanced exploration with exploitation phases and the propensity for local optima entrapment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20