Search Results - (( (variable OR variables) loading optimization algorithm ) OR ( java _ encryption algorithm ))
Search alternatives:
- loading optimization »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…The results show that the neural network optimized with genetic algorithm and trained with an optimally and intelligently selected input vector containing historical load and meteorological variables produced the best prediction accuracy. …”
Get full text
Get full text
Article -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
4
Optimal planning of energy storage system for hybrid power system considering multi correlated input stochastic variables
Published 2025Subjects:Article -
5
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. …”
Get full text
Get full text
Get full text
Article -
6
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. …”
Get full text
Get full text
Get full text
Article -
7
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…Alternatively, variable length searching enables searching within the variable length of the solution space, which leads to more optimality and less computational load. …”
Get full text
Get full text
Get full text
Article -
8
Optimization Of Bar Linkage By Using Genetic Algorithms
Published 2005“…This thesis presents the method of using simple Genetic Algorithms (GAs) in optimizing the size of bar linkage with discrete design variables and continues design variables. …”
Get full text
Get full text
Monograph -
9
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
10
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
11
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
12
Effect of input variables selection on energy demand prediction based on intelligent hybrid neural networks
Published 2015“…The results show that hybrid forecast model provide better performance when it is trained and tested with optimally selected input variable vector (IV), containing historical load and meteorological variables. …”
Get full text
Get full text
Article -
13
Sediment load forecasting from a biomimetic optimization perspective: Firefly and Artificial Bee Colony algorithms empowered neural network modeling in �oruh River
Published 2025“…The service life of downstream dams, river hydraulics, waterworks construction, and reservoir management is significantly affected by the amount of sediment load (SL). This study combined models such as the artificial neural network (ANN) algorithm with the Firefly algorithm (FA) and Artificial Bee Colony (ABC) optimization techniques for the estimation of monthly SL values in the �oruh River in Northeastern Turkey. …”
Article -
14
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. …”
Get full text
Get full text
Undergraduates Project Papers -
15
One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network
Published 2012“…In this project, an Artificial Neural Network (ANN) trained by the Invasive Weed Optimization (IWO) learning algorithm is proposed for short term load forecasting (STLF) model. …”
Get full text
Get full text
Student Project -
16
To develop an efficient variable speed compressor motor system
Published 2007“…To achieve a robust controller from variation of motor parameters, a real-time or on-line learning algorithm based on a second order optimization Levenberg-Marquardt is employed. …”
Get full text
Get full text
Other -
17
Provider independent cryptographic tools
Published 2003“…The library consists of cryptographic algorithms that include symmetric and asymmetric encryptions, key exchange, hashing algorithms and digital signature algorithms. …”
Get full text
Get full text
Get full text
Monograph -
18
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…This research hopes to give a clear idea to the readers about ABS algorithm. Further research about this topic is recommended to increase the efficiency of ABS algorithm implemented in communication field, so that more different types of field can be encrypted and decrypted instead of plaintext.…”
Get full text
Get full text
Undergraduates Project Papers -
19
An Application of Cuckoo Search Algorithm for Solving Optimal Chiller Loading Problem for Energy Conservation
Published 2014“…This paper presents a recent swarm intelligence technique viz. Cuckoo Search Algorithm (CSA) for solving the Optimal Chiller Loading (OCL) problem for energy conservation. …”
Get full text
Conference or Workshop Item -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item
