Search Results - (( based operations using algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- based operations »
- operations using »
- java application »
- using algorithm »
- application rsa »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Reservoir operation based on evolutionary algorithms and multi-criteria decision-making under climate change and uncertainty
Published 2018“…The reliability, resiliency, and vulnerability indices, based on a multi-criteria model, were used to select the base method for reservoir operation. …”
Get full text
Get full text
Article -
7
Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq
Published 2016“…The first algorithm was based on the traditional simulation of reservoir operation, whilst the second algorithm (Salg) enhanced the GAOM by changing the population values of GA through a new simulation process of reservoir operation. …”
Get full text
Get full text
Get full text
Article -
8
A genetic algorithm with fuzzy crossover operator and probability
Published 2012“…A new crossover operator and probability selection technique is proposed based on the population diversity using a fuzzy logic controller. …”
Get full text
Get full text
Get full text
Article -
9
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
10
A self-tuning filter-based adaptive linear neuron approach for operation of three-level inverter-based shunt active power filters under non-ideal source voltage conditions
Published 2017“…However, no work has been conducted to study its performance under non-ideal source voltage conditions. In this work, a STF-based fundamental voltage extraction algorithm is integrated with an ADALINE algorithm, serving as synchronizer algorithm to ensure in-phase operation of the generated reference current with the non-ideal source voltage. …”
Get full text
Get full text
Article -
11
Pairwise Test Suite Generation Using Adaptive Teaching Learning-Based Optimization Algorithm with Remedial Operator
Published 2019“…ATLBO is a recent enhanced variant of Teaching Learning-based Optimization (TLBO) algorithm that adaptively applies its search operations using a Mamdani-type fuzzy inference system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems
Published 2014“…The algorithm used weight mapping crossover (WMX) and Insertion Mutation (IM) as genetic operators for sub-chromosomes represented with priority-based representation. …”
Get full text
Get full text
Thesis -
13
Optimal operation of multi-reservoir systems for increasing power generation using a seagull optimization algorithm and heading policy
Published 2021“…The Seagull Optimization Algorithm was then used to find two heading parameters of the TPHRs. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
BASE: a bacteria foraging algorithm for cell formation with sequence data
Published 2010“…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Visual servo algorithm of robot arm for pick and place application
Published 2024“…There are two different methods for analyzing the robot arm’s movement: forward and inverse kinematic analysis. Based on the visual servo algorithm, this study uses inverse kinematics to execute the pick and place operation. …”
Get full text
Get full text
Get full text
Article -
17
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
18
Deriving Optimal Operation Rule for Reservoir System Using Enhanced Optimization Algorithms
Published 2025“…The results revealed that the used algorithms effectively mitigated water shortages and excess releases compared to the current operational strategy. …”
Article -
19
Guidance and control for satellite in-orbit-self-assembly proximity operations
Published 2015“…The guidance algorithm is based on a modified version of the inbound glideslope transfer that was used in the past for rendezvous and proximity operations of the space shuttle with other vehicles. …”
Get full text
Get full text
Get full text
Article -
20
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…In conclusion, performance of a scalar multiplication algorithm depends on the digits used in the scalar representation, and the efficiency of the point operations involved in the scalar multiplication algorithm. …”
Get full text
Get full text
Thesis
