Search Results - (( developing current evolutionary algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- current evolutionary »
- developing current »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Intelligent Evolutionary Controller for Flexible Robotic Arm
Published 2020“…The developed evolutionary algorithms have been implemented and experimentally verified using robotic arm manipulator experimental rig. …”
Get full text
Get full text
Get full text
Article -
6
Using the evolutionary mating algorithm for optimizing deep learning parameters for battery state of charge estimation of electric vehicle
Published 2023“…This paper presents the application of a recent metaheuristic algorithm namely Evolutionary Mating Algorithm (EMA) for optimizing the Deep Learning (DL) parameters to estimate the state of charge (SOC) of a battery for an electric vehicle in the real environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Metric's thresholds for encoding evolutionary computing representation in software engineering problem
Published 2015“…This paper presents metrics thresholds encoding algorithm as an alternative to replace human experts in developing problem representation. …”
Get full text
Get full text
Get full text
Article -
8
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
9
Computational intellegence approach for overcurrent relay coordination
Published 2024text::Final Year Project -
10
An extended adaptive mechanism of evolutionary based channel assignment via reinforcement
Published 2012“…Current development in the field of wireless mobile communication is extremely limited by the capacity constraints of the available frequency spectrum. …”
Get full text
Get full text
Research Report -
11
Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman
Published 2021“…Subsequently, the CI-based sizing algorithm, known as Evolutionary-Dolphin Echolocation Programming Sizing Algorithm (EDEPSA) is formulated to determine the optimal models of each system component such that either Performance Ratio (PR) or Levelized Cost of Electricity (LCOE) of the system is optimized. …”
Get full text
Get full text
Thesis -
12
Enhanced multi-objective evolutionary mating algorithm with improved crowding distance and levy flight for optimizing comfort index and energy consumption in smart buildings
Published 2025“…While current Evolutionary Mating Algorithms (EMA) primarily focus on single-objective optimization and rely on weighted functions for handling multiple objectives, such approaches prove impractical for the complex trade-offs between comfort index and energy efficiency. …”
Get full text
Get full text
Get full text
Article -
13
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000Get full text
Get full text
Article -
14
Solving multi-objective dynamic vehicle routing problem with time windows using multi-objective algorithm
Published 2022“…Our algorithm uses non-fitness evolutionary distributed parallelized adaptive large neighbourhood search (NEDPALNS). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Early explorations of EEG as a method for interactive evolutionary design of 3-dimensional objects
Published 2015“…However, current automatic generation algorithms have focused primarily on 2D art only and have not successfully crossed the realm into 3D. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
-
20
Optimization of zinc oxide surge arrester design in reducing leakage current / Nurul Ain Abdul Latiff
Published 2018“…Evolutionary computation methods, imperialist competitive algorithm (ICA) and gravitational search algorithm (GSA) were employed to optimise the arrester designs, which can minimise the leakage current. …”
Get full text
Get full text
Get full text
Thesis
