Search Results - (( based operations using algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Reservoir operation based on evolutionary algorithms and multi-criteria decision-making under climate change and uncertainty by Ehteram, Mohammad, Mousavi, Sayed Farhad, Karami, Hojat, Farzin, Saeed, Singh, Vijay P., Chau, Kwok Wing, El-Shafie, Ahmed

    Published 2018
    “…The reliability, resiliency, and vulnerability indices, based on a multi-criteria model, were used to select the base method for reservoir operation. …”
    Get full text
    Get full text
    Article
  7. 7

    Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq by Al‑Aqeeli, Yousif H., Lee, Teang Shui, Abd Aziz, Samsuzana

    Published 2016
    “…The first algorithm was based on the traditional simulation of reservoir operation, whilst the second algorithm (Salg) enhanced the GAOM by changing the population values of GA through a new simulation process of reservoir operation. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A genetic algorithm with fuzzy crossover operator and probability by Varnamkhasti, Mohammad Jalali, Lee, Lai Soon, Abu Bakar, Mohd Rizam, Leong, Wah June

    Published 2012
    “…A new crossover operator and probability selection technique is proposed based on the population diversity using a fuzzy logic controller. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A self-tuning filter-based adaptive linear neuron approach for operation of three-level inverter-based shunt active power filters under non-ideal source voltage conditions by Yap, Hoon, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2017
    “…However, no work has been conducted to study its performance under non-ideal source voltage conditions. In this work, a STF-based fundamental voltage extraction algorithm is integrated with an ADALINE algorithm, serving as synchronizer algorithm to ensure in-phase operation of the generated reference current with the non-ideal source voltage. …”
    Get full text
    Get full text
    Article
  11. 11

    Pairwise Test Suite Generation Using Adaptive Teaching Learning-Based Optimization Algorithm with Remedial Operator by Fakhrud, Din, Kamal Z., Zamli

    Published 2019
    “…ATLBO is a recent enhanced variant of Teaching Learning-based Optimization (TLBO) algorithm that adaptively applies its search operations using a Mamdani-type fuzzy inference system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems by Umar, Umar Ali

    Published 2014
    “…The algorithm used weight mapping crossover (WMX) and Insertion Mutation (IM) as genetic operators for sub-chromosomes represented with priority-based representation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    BASE: a bacteria foraging algorithm for cell formation with sequence data by Nouri, Hossein, Tang, Sai Hong, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar

    Published 2010
    “…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Visual servo algorithm of robot arm for pick and place application by Chuah, Zuo Wei, Mohd Hairi Mohd Zaman, Mohd Faisal Ibrahim

    Published 2024
    “…There are two different methods for analyzing the robot arm’s movement: forward and inverse kinematic analysis. Based on the visual servo algorithm, this study uses inverse kinematics to execute the pick and place operation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Deriving Optimal Operation Rule for Reservoir System Using Enhanced Optimization Algorithms by Almubaidin M.A., Ahmed A.N., Sidek L.M., AL-Assifeh K.A.H., El-Shafie A.

    Published 2025
    “…The results revealed that the used algorithms effectively mitigated water shortages and excess releases compared to the current operational strategy. …”
    Article
  19. 19

    Guidance and control for satellite in-orbit-self-assembly proximity operations by Okasha, Mohamed Elsayed Aly Abd Elaziz, Park, Chandeok, Park, Sang-Young

    Published 2015
    “…The guidance algorithm is based on a modified version of the inbound glideslope transfer that was used in the past for rendezvous and proximity operations of the space shuttle with other vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field by Md Yasin, Sharifah

    Published 2011
    “…In conclusion, performance of a scalar multiplication algorithm depends on the digits used in the scalar representation, and the efficiency of the point operations involved in the scalar multiplication algorithm. …”
    Get full text
    Get full text
    Thesis