Search Results - (( developing future evolution algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Resource allocation in coordinated multipoint long term evolution-advanced networks by Katiran, Norshidah

    Published 2015
    “…The proposed resource allocation algorithm has been proven to provide a significant improved performance for CoMP LTE-Advanced network and can be extended to future 5G network.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A holistic review on artificial intelligence techniques for well placement optimization problem by Islam, J., Vasant, P.M., Negash, B.M., Laruccia, M.B., Myint, M., Watada, J.

    Published 2020
    “…Nature-inspired gradient-free optimization algorithms like particle swarm optimization, genetic algorithm, covariance matrix adaptation evolution strategy and differential evolution have been utilized in this area. …”
    Get full text
    Get full text
    Article
  9. 9

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2018
    “…This thesis proposed an efficient algorithm, namely, the Quality of Service (QoS) and Energy Efficient Aware (QEEA). …”
    Get full text
    Get full text
    Book Section
  10. 10

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…The author believes that "Fingerprint Frontier: The Evolution of Biometric Security" will serve as a complete reference, shining light on the current landscape while exposing potential future paths in this ever-changing subject. …”
    Get full text
    Get full text
    Get full text
    Book
  11. 11

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The results showed that the QEEA algorithm outperformed the other algorithms as it could achieve up to 18% of maximum throughput, 27% reduction in ECR, and 36% improvement in EE in terms of radius ranging from 200 m to 1000 m. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change by Nurul Nadrah Aqilah, Tukimat

    Published 2014
    “…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
    Get full text
    Get full text
    Thesis
  13. 13

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…The rapid evolution of computational intelligence has driven significant interest in hybrid metaheuristics, which combine multiple optimization algorithms to solve complicated problems more efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A study of packet scheduling with mobile cellular channel impairments by Mohd. Ramli, Huda Adibah, Sandrasegaran, Kumbesan, Abdullah, Khaizuran

    Published 2012
    “…Future works include development of a new packet scheduling algorithm to overcome detrimental effects due to LTE-A channel impairments on the QoS of multimedia services.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    A study of packet scheduling with mobile cellular channel impairments by Mohd. Ramli, Huda Adibah, Sandrasegaran, Kumbesan, Abdullah, Khaizuran

    Published 2012
    “…Future works include development of a new packet scheduling algorithm to overcome detrimental effects due to LTE-A channel impairments on the QoS of multimedia services.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Conclusion by Alginahi, Yasser M., Kabir, M. Nomani

    Published 2019
    “…All these chapters include research challenges and future research directions with the evolution of technologies.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…Finally, the popular benchmarks available for developing and evaluating these algorithms are presented along with a comparative study on a different class of algorithms. …”
    Get full text
    Get full text
    Article
  20. 20

    Prediction of CO2 emission for the central European countries through five metaheuristic optimization techniques helping multilayer perceptron by Moayedi H., Mukhtar A., Alshammari S., Boujelbene M., Elbadawi I., Thi Q.T., Mirzaei M.

    Published 2025
    “…The GDP of the Central European countries (from 1990 to 2016) based on several energy sources, such as coal, oil, natural gas, and renewable energy, are used as inputs in this study. To develop a reliable predictive network considering the problem complexity, multilayer perceptron (MLP) is combined with several nature-inspired optimization algorithms, namely, black hole algorithm (BHA), future search algorithm (FSA), backtracking search algorithm (BSA), biogeography-based optimization (BBO), and shuffled complex evolution (SCE). …”
    Article