Search Results - (( java application rsa algorithm ) OR ( parametric estimation case algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…The major research findings were as follows: 1) the non-parametric and parametric estimation methods using the right and interval censoring types produced highly efficient cure rate parameters when the censoring rate was decreased to the minimum possible; 2) Non-parametric estimation of the cure fraction using interval censored data based on Turnbull estimator resulted in more precise cure fraction than the Kaplan Meier estimator considering the interval midpoint to represent the exact life time; 3) The parametric estimation of the cure fraction based on the exponential distribution and right and interval censoring types produced more consistent estimates than the Weibull distribution especially in case of heavy censoring; 4) Parametric estimation of the cure fraction was more efficient when some covariates had been involved in the analysis than when covariates had been excluded; and 5) the nonparametric estimation method is the viable alternative to the parametric one when the data set contains substantial censored observations while in the case of low censoring the parametric method is more attractive.…”
    Get full text
    Get full text
    Thesis
  6. 6

    System Identification of XY Table ballscrew drive using parametric and non parametric frequency domain estimation via deterministic approach by Abdullah, Lokman, Jamaludin, Zamberi, Tsung Heng, Chiew, RAFAN, NUR AIDAWATY, syed mohamed, muhammad syafiq

    Published 2012
    “…In addition, comparison of estimated model transfer function obtained via non-linear least square (NLLS) and Linear least square estimator algorithm were also being addressed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Parametric maximum likelihood estimation of cure fraction using interval-censored data by Aljawadi, Bader Ahmad I., Abu Bakar, Mohd Rizam, Ibrahim, Noor Akma, Al-Omari, Mohamad

    Published 2013
    “…We ran the analysis using the EM algorithm considering two cases: i) when no covariates were involved in the estimation, and ii) when some covariates were involved. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Parametric cure fraction models for interval-censoring with a change-point based on a covariate threshold by Ali Taweab, Fauzia

    Published 2015
    “…The proposed model has sound motivation in relapse of cancer and can be used in other disease models. The parametric maximum likelihood estimation method is employed to verify the performance of the MCM within the framework of the expectation-maximization (EM) algorithm while the estimation methods for other models are employed in a simpler and straightforward setting. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Parameter estimation of the cure fraction based on BCH model using left-censored data with covariates. by I. Aljawadi, Bader Ahnad, Abu Bakar, Mohd Rizam, Ibrahim, Noor Akma, Midi, Habshah

    Published 2011
    “…The analysis is constructed by means of the exponential distribution in the case of left censoring and within the framework of the expectation maximization (EM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Field data-based mathematical modeling by Bode equations and vector fitting algorithm for renewable energy applications by Sabry, Ahmad H., Wan Hasan, Wan Zuha, Ab Kadir, M. Zainal A., Mohd Radzi, Mohd Amran, Shafie, Suhaidi

    Published 2018
    “…This paper proposes a new modified methodology presented as a parametric technique to determine the system’s modeling equations based on the Bode plot equations and the vector fitting (VF) algorithm by fitting the experimental data points. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Lightning peak current estimation using a system identification approach by Wern T.L.T., Mukerjee R.N.

    Published 2023
    “…A system identification-based lightning peak current estimation algorithm using upper-air radiosonde observations is developed. …”
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Channel Modeling and Direction-of-Arrival Estimation in Mobile Multiple-Antenna Communication Systems by Ravari, Arastoo Rostami

    Published 2005
    “…Since the joint spatial and temporal characteristics are unknown, non-parametric channel estimation approaches are required in this case in order to estimate the channel parameter, which is the subject of the second part. …”
    Get full text
    Get full text
    Thesis