Search Results - (( model verification method algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- verification method »
- method algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Verification of algorithm of interpolation method had verified that only two interpolation methods are useable for producing results which are Bilinear Interpolation and Inverse Distance Weighted. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
A Novel Approach Of Groebner Bases Computation For Safety Analysis Of Distributed Discrete Controllers
Published 2019“…This research also proposes the improvement of mean time to failure (MTTF) by using the new model checking method. At the end of this research, a complete tool of model checking method based on Groebner bases algorithm for safety verification will be produced. …”
Get full text
Get full text
Get full text
Technical Report -
10
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
11
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The thesis was set to three objectives as follows; to develop a new augmentation algorithm of Simplex method from the existed augmentation studies; to integrate the superiorities of the QSM and BLSA algorithms that can enhance computational performance; to compare the performance of the new augmentation algorithm with the conventional Simplex, QSM and BLSA in reducing iteration number. …”
Get full text
Get full text
Get full text
Thesis -
12
Effects of integration on the cost reduction in distribution network design for perishable products
Published 2014“…To solve the integrated model, a memetic algorithm (MA) is developed in this study. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Numerical simulation and experimental verification on distortions induced by wire-arc additive manufacturing components and costing analysis / Keval Priapratama Prajadhiana
Published 2024“…On analysing the distortion effect by means of numerical computation method, a commercial specialized simulation software Simufact.Welding was used in the development of the numerical model. …”
Get full text
Get full text
Thesis -
15
Verification of volume-of-fluid (VOF) simulation for thin liquid film applications
Published 2023“…This paper describes the application of the built-in Volume-of-Fluid (VOF) model in the commercial Computational Fluid Dynamics (CFD) software FLUENTTM and the verification of its accuracy. …”
Conference paper -
16
An automatic grading model for semantic complexity of english texts using bidirectional attention-based autoencoder
Published 2024“…The experimental results show that the overall accuracy of BSETG algorithm is maintained between 70% and 90%, the response speed of BSETG algorithm is relatively fast, and the success rate of BSETG algorithm is relatively stable to a large extent.…”
Get full text
Get full text
Article -
17
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…Then, it is tested on the FPGA using the properties of hardware co-simulation method. The system verification is performed by simulating the hardware co-simulation for the metric value of the EXP-BET metric algorithm and compared against the manual calculation.…”
Get full text
Get full text
Thesis -
18
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
19
-
20
Non-fiducial based ECG biometric authentication using one-class support vector machine
Published 2017“…Moreover, one-class SVM can be robust recognition algorithm for ECG biometric verification if the sufficient number of biometric samples is available.…”
Get full text
Get full text
Conference or Workshop Item
