Search Results - (( developing program rsa algorithm ) OR ( carlo simulation optimization algorithm ))
Search alternatives:
- developing program »
- carlo simulation »
- rsa algorithm »
- program rsa »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH
Published 2021“…A hybrid population – based stochastic optimization method named MVMO-SH algorithm is proposed to optimize PVDG locations and sizes in the grid system network. …”
Get full text
Get full text
Thesis -
3
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
4
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
5
Optimal planning of energy storage system for hybrid power system considering multi correlated input stochastic variables
Published 2025Subjects:Article -
6
Optimal sizing of hybrid tidal, photovoltaic and battery sources of energy
Published 2015“…The numbers of solar arrays, tidal turbines and battery were considered as optimization variables which have been determined by the particle swarm optimization algorithm. …”
Get full text
Get full text
Thesis -
7
Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy
Published 2019“…Additionally, the efficiency of the planned algorithm in numerical simulation was compared to that of the "Monte Carlo simulation" (MCS).…”
Get full text
Get full text
Conference or Workshop Item -
8
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
9
Long-term optimal planning for renewable based distributed generators and battery energy storage systems toward enhancement of green energy penetration
Published 2025“…The backward reduction method (BRM) is then applied to streamline the number of generated scenarios, reducing computational efforts. To solve the optimization planning model, a hybrid optimization algorithm is proposed, combining the non-dominating sorting genetic algorithm (NSGAII) and multi-objective particle swarm optimization (MOPSO). …”
Article -
10
Optimization of RFID network planning using MDB-FA method
Published 2017“…The generated data are utilized as an input representation to apply into firefly algorithm based on Density-Based Algorithm (DBSCAN) to find the optimal network solution. …”
Get full text
Get full text
Article -
11
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
12
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
13
Physics-guided deep neural network to characterize non-Newtonian fluid flow for optimal use of energy resources
Published 2021“…The detailed parametric analysis exhibits the competency of the proposed algorithm to explain the rheological features. Monte-Carlo simulation is performed by propagating uncertainty to investigate the dominant parameters affecting simulated results. …”
Get full text
Get full text
Article -
14
-
15
-
16
Long-term optimal planning of distributed generations and battery energy storage systems towards high integration of green energy considering uncertainty and demand response progra...
Published 2025“…To address uncertainties in wind speed, solar irradiation, load demands, and energy prices, Monte Carlo Simulation (MCS) is employed. Scenario reduction through the Backward Reduction Algorithm (BRA) manages computational complexity. …”
Article -
17
A new optimisation framework based on Monte Carlo embedded hybrid variant mean–variance mapping considering uncertainties
Published 2024“…The Monte Carlo-embedded MVMO-SH was then used to optimise PVDG in the urban RDN. …”
Get full text
Get full text
Get full text
Article -
18
Accurate range free localization in multi-hop wireless sensor networks
Published 2019“…The performance is evaluated in terms of RMSE in terms of three algorithms WLS, CRLR, and GMSDP based on using the Monte Carlo simulation with account the number of anchors that varying from anchor=4 to anchor =20. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Satellite attitude determination utilizing measurement sensor data and kalman filtering
Published 2006“…This assessment was done by using Monte Carlo methods to simulate these sensors. Using only star measurements an optimal satellite orientation estimate is found using the method of least squares, and the particular algorithm invoked is referred to ESOQ2 method. …”
Get full text
Get full text
Article -
20
