Search Results - (( model identification path algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An improved narrowband active noise control system without secondary path modelling based on the time domain by Mondal, Kuheli, Das, Saurav, Hamada, Nozomu, Haji Abu, Aminudin, Das, Saikat, Faris, Waleed Fekry, Toh, Hoong Thiam, Ahmad, Akij

    Published 2019
    “…Several secondary path, acoustic noise cancellation modelling causes the problems to increase the complexity of ANC implementation, reduction of performance caused by modelling error and requirement of auxiliary noise for secondary path modelling. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…The technique used for the route planning is Dijkstra's algorithm. In modelling database for Indoor Navigation System, the system only relies on the use of identification of nearby Wi-Fi access point. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…The advantage of replacing the SEF with the THF is the ability of the latter to be realised in a nonlinear modelling scheme. Subsequently, the THF modelling scheme can be incorporated into an established real time NLFXLMS algorithm termed THF-NLFXLMS algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems by Salih, Dhiadeen Mohammed

    Published 2015
    “…Wavelet networks (WNs) have been introduced as an alternative method of the neural networks for nonlinear system identification and used with model predictive control (MPC) techniques in many applications. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Design of self-tuning minimum effort active noise control with feedback inclusion architecture by Raja Ahmad, Raja Mohd Kamil, Tokhi, Mohammad Osman

    Published 2009
    “…It was found that the optimal controller designed using this technique which is constrained only by the accuracy of the two models identified using recursive least squares algorithm, yields good cancellation level. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…To optimize the arrangement of routers for real implementation of the developed system in health facilities, the developed path loss model estimates that the router should be positioned at a distance of 30 m from each other, which agrees with the test results which indicate that the router should be positioned ≤ 40 m in order to achieve the best PDR performance.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom by Chai, Chen Chu

    Published 2018
    “…Six tessellation origami models consisting of three variations of Miura-ori, Russo’s Optical Illusion, Yoshimura and Ron Resch pattern were selected to investigate the transformation under different paths using the generative modeling tool. …”
    Get full text
    Get full text
    Thesis
  20. 20