Search Results - (( (variable OR variables) generation using algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Maximizing power generation in variable speed micro-hydro with power point tracking by Min Keng Tan, Norafe Maximo Javinez, Kit Guan Lim, Ahmad Razani Haron, Pungut Ibrahim, Kenneth Tze Kin Teo

    Published 2022
    “…As such, this paper aims to explore and develop a feasible maximum power point tracker (MPPT) with perturb and observe (P&O) and genetic algorithm (GA) in providing optimal power generation for variable speed micro-hydro system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  7. 7

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition by Yahya, Anwar Ali, Mahmod, Ramlan, Ramli, Abd Rahman

    Published 2010
    “…In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
    Get full text
    Get full text
    Article
  9. 9

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
    Get full text
    Get full text
    Article
  10. 10

    A variable combinatorial test suite strategy based on modified greedy algorithm by Homaid, Ameen A. Ba, Alsewari, Abdulrahman A.

    Published 2015
    “…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, Koting, Suhana, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2019
    “…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
    Get full text
    Get full text
    Article
  13. 13

    Variable step-size hill-climbing search (VS-HCS) MPPT algorithm for hydrokinetic energy harnessing by Wan Ismail, Ibrahim, Nasiruddin, Sadan, Noor Lina, Ramli, Mohd Riduwan, Ghazali, Ilham, Fuad

    Published 2025
    “…In this paper, the Variable-Step Hill Climbing Search (VS-HCS) MPPT algorithm is proposed to solve the limitation of the conventional HCS MPPT. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    Independent And Dependent Job Scheduling Algorithms Based On Weighting Model For Grid Environment by M. Al-Najjar, Hazem

    Published 2018
    “…After that, ranking equation is used to arrange the generated classes from lightest to heaviest. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A hybrid genetic algorithm and linear regression for prediction of NOx emission in power generation plant by Bunyamin M.A., Yap K.S., Aziz N.L.A.A., Tiong S.K., Wong S.Y., Kamal M.F.

    Published 2023
    “…This paper presents a new approach of gas emission estimation in power generation plant using a hybrid Genetic Algorithm (GA) and Linear Regression (LR) (denoted as GA-LR). …”
    Conference paper
  17. 17

    A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data by Rana, M.M., Rahman, A., Uddin, M., Sarkar, M.R., Shezan, S.A., Ishraque, M.F., Rafin, S.M.S.H., Atef, M.

    Published 2022
    “…The CVDTA algorithm deals with the hybrid photovoltaic (PV)â��battery energy storage system (BESS) to provide the peak shaving service where the capacity addition technique uses a peaking generator to minimize the peak demand. …”
    Get full text
    Get full text
    Article
  18. 18

    Bayesian logistic regression model on risk factors of type 2 diabetes mellitus by Chiaka, Emenyonu Sandra

    Published 2016
    “…Logistic regression model has long been known and it is commonly used in analysing a binary outcome or dependent variable and connects the binary dependent variable to several independent variables. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Application of Hybrid Evolutionary Algorithm and thematic map for rule set generation and visualization of chlorophyta abundance at Putrajaya lake / Lau Chia Fong by Lau, Chia Fong

    Published 2013
    “…HEA is run on the training set in order to provide insights on the relationships between input variables and the algae abundance. Performances of the rule sets are assessed using Receiving Operating Characteristic (ROC) with true positive rate. …”
    Get full text
    Get full text
    Thesis
  20. 20