Search Results - (( data estimation ((path algorithm) OR (bat algorithm)) ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Active measurement techniques performed by overlay nodes can provide bandwidth estimations of an end-to-end overlay path. This thesis describes a new algorithm called “COPPA,” which is an in-band path probing algorithm for measuring the end-to-end available bandwidth of an overlay path accurately and continuously. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Delay-based load-balancing routing (DLBR) algorithm for wireless ad-hoc networks by Habib, I., Badruddin, N., Drieberg, M.

    Published 2015
    “…The DLBR then uses this metric to select high capacity links for data forwarding, thus providing paths with less congested nodes and high capacity links. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Delay-based load-balancing routing (DLBR) algorithm for wireless ad-hoc networks by Habib, I., Badruddin, N., Drieberg, M.

    Published 2015
    “…The DLBR then uses this metric to select high capacity links for data forwarding, thus providing paths with less congested nodes and high capacity links. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET by Hemalatha, S., Kshirsagar, P.R., Manoharan, H., Vasantha Gowri, N., Vani, A., Qaiyum, S., Vijayakumar, P., Tirth, V., Haleem, S.L.A., Chakrabarti, P., Teressa, D.M.

    Published 2022
    “…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A network aware based recommender system for VOIP application service in eLearning environment / Nazdiana Ab. Wahab by Ab. Wahab, Nazdiana

    Published 2009
    “…Pathload has been chosen as a measurement tool that estimates the available bandwidth of a network path.…”
    Get full text
    Get full text
    Thesis
  13. 13

    A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm by Masood, Kamal

    Published 2015
    “…The proposed model serves as path-independent fatigue life estimating tool hence can be used with any type of loading conditions. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Accurate range free localization in multi-hop wireless sensor networks by Abdulwahhab, Abdullah Raed

    Published 2019
    “…Finally, the GMSDP- algorithm achieves and provides a better value of RMSEs and the greatest localization estimation errors comparing with the CRLR algorithm and WLS algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Coordinate-Descent Adaptation over Hamiltonian Multi-Agent Networks by Azam Khalili, Vahid Vahidpour, Amir Rastegarnia, Ali Farzamnia, Teo, Kenneth Tze Kin, Saeid Sanei

    Published 2021
    “…To implement the ILMS algorithm, each node needs to receive the local estimate of the previous node on the cycle path to update its own local estimate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Fuzzy logic-based arrival time estimation for indoor navigation using augmented reality by Mohammed Sohif, Muhammad Hidayat, Mardzuki, Muhammad Imran, Mohd Ibrahim, Azhar, Haja Mohideen, Ahmad Jazlan

    Published 2025
    “…This study proposes a mobile AR application for indoor navigation that uses an intelligent signage algorithm based on fuzzy logic to estimate arrival time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Acoustic emission partial discharge localization in oil based on artificial bee colony by Lim, Zhi Yang, Azis, Norhafiz, Mohd Hashim, Ahmad Hafiz, Mohd Radzi, Mohd Amran, Norsahperi, Nor Mohd Haziq, Mohd Ariffin, Azrul

    Published 2025
    “…After 500 iterations, the optimal solution was the estimated PD location produced by ABC. Comparisons with the genetic algorithm (GA), particle swarm optimization (PSO) and bat algorithm (BA) revealed that the distance error, maximum deviation and computation time for AE PD localization based on ABC are the lowest. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Genetic algorithm for control and optimisation of exothermic batch process by Tan, Min Keng

    Published 2013
    “…Although the proposed genetic algorithm controller (GAC) is able to regulate the process temperature to the desired path, it does not limit the waste production effectively. …”
    Get full text
    Get full text
    Get full text
    Thesis