Search Results - (( java application rsa algorithm ) OR ( (parameter OR parameters) equalization based algorithm ))
Search alternatives:
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Optimal CC-CV charging of lithium-ion battery for charge equalization controller
Published 2023Conference Paper -
8
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…Harris’s hawk multi-objective optimizer (HHMO) algorithm is a MOSIbased algorithm that was developed based on the reference point approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Location determination using radio frequency RSSI and deterministic algorithm
Published 2008Get full text
Get full text
Conference or Workshop Item -
10
-
11
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
12
-
13
-
14
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
15
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
16
Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das
Published 2019“…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
Get full text
Get full text
Get full text
Thesis -
17
A combinatory algorithm of univariate and multivariate gene selection
Published 2009“…In this paper, we considered new parameters which come up from singular value decomposition and present a combination algorithm for gene selection to integrate the univariate and multivariate approaches and compare it with gene selection based on correlation coefficient with binary output classes to analyze the effect of new parameters. …”
Get full text
Get full text
Get full text
Article -
18
DESIGN AND DEVELOPMENT OF HIGH-ACCURACY MACHINE FOR WIRE BENDING
Published 2023“…Firstly, using the proposed bending machine, in which the proposed algorithm is applied. Secondly, using the bending machine implemented without applying the proposed algorithm. …”
Article -
19
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
Get full text
Get full text
Get full text
Thesis -
20
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis
