Search Results - (( developing technology evolution algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    On fractional and semi-soft handover in long term evolution(LTE) networks by Hussein, Yaseein Soubhi, Mohd Ali, Borhanuddin, Varahram, Pooria

    Published 2011
    “…In this paper a hybrid HO algorithms called semi-soft handover (SSHO) and fractional soft handover (FSHO) in long term evolution (LTE) system are studied. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Enhanced handover mechanism in long term evolution (LTE) networks by Hussein, Yaseein Soubhi, Mohd Ali, Borhanuddin, Varahram, Pooria, Sali, Aduwati

    Published 2011
    “…The fast pace development of this technology and the challenges it presents due to the increasing number of user equipments and the demand to have the service on-the-go, have presented new challenges on base stations capability and the handover (HO) techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network by Usman, I. H., Nordin, N. K., Omizegba, E. E., Sali, A., Rasid, M. F. A., Hashim, F.

    Published 2021
    “…These demands have led to the technological responses such as the advancement in radio access, coding and modulation schemes as well as spectrum(carrier) aggregation and cognitive radio capabilities of Long Term Evolution - Advanced (LTE-A) and Fifth Generation (5G) networks developed by the Third Generation Partnership Project (3GPP). …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…It seeks to bridge the gap between intricate technicalities and broader societal repercussions, negotiating the intersection of security, technology, and ethics. The author believes that "Fingerprint Frontier: The Evolution of Biometric Security" will serve as a complete reference, shining light on the current landscape while exposing potential future paths in this ever-changing subject. …”
    Get full text
    Get full text
    Get full text
    Book
  16. 16
  17. 17

    Automatic generation of multi-objective neural game controllers using Pareto-based differential evolution by Chin, Kim On, Jason Teo, Chang, Kee Tong

    Published 2010
    “…For this research, three Evolutionary Algorithm (EA) (Genetic Algorithm (GA), Differential Evolution (DE), and POE) is use to evolve a Feed-Forward Artifitial Neural Networks (FFANN) to playa custom made map in Warcraft III and the outcome is compared amng them. …”
    Get full text
    Get full text
    Research Report
  18. 18
  19. 19

    Automating commercial video game development using computational intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Patricia Anthony

    Published 2011
    “…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20