Search Results - (( developing world evolution algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- evolution algorithm »
- java implementation »
- implementation rsa »
- developing world »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Navigating challenges and opportunities of machine learning in hydrogen catalysis and production processes: Beyond algorithm development
Published 2025“…While the literature reflects a promising landscape for ML applications in hydrogen energy domains, transitioning AI-based algorithms from controlled environments to real-world applications poses significant challenges. …”
Review -
7
-
8
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
9
Design, optimization and fabrication of a climbing six articulated-wheeled robot using artificial evolution and 3D printing
Published 2015“…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Sub-route reversal repair mechanism and differential evolution for urban transit network design problem
Published 2017“…Hence, we focus on urban transit routing problem and develop a framework for tackling the problem. The problem is solved both as a single and multiobjective optimization problems based on small and large benchmark instances, as well as a real-world network. …”
Get full text
Get full text
Thesis -
11
Automatic generation of multi-objective neural game controllers using Pareto-based differential evolution
Published 2010“…Eversince the born of personal computer to this world, computer games have not been stoping in their development. …”
Get full text
Get full text
Research Report -
12
Automating commercial video game development using computational intelligence
Published 2011“…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
Get full text
Get full text
Get full text
Article -
13
Fingerprint frontier: the evolution of biometric security
Published 2023“…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
Get full text
Get full text
Get full text
Book -
14
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…VL-WIDE was also integrated with the solution selection model based on the Analytical Hierarchical Process (AHP) that considers decision-maker preference for the optimized objectives. Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
16
Grey wolf optimization and differential evolution-based maximum power point tracking controller for photovoltaic systems under partial shading conditions
Published 2022“…To track the global maximum peak power (GMPP) instead of local maxima peak power (LMPP), the combination of gray wolf optimization (GWO) and differential evolution (DE) algorithm is hybridized (GWO-DE) in this work. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Automatic design, optimization and In-Situ Fabrication of Heterogeneous Swarm Robot bodies using 3-D printing and multi-objective evolutionary algorithms
Published 2012“…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
Get full text
Get full text
Research Report -
18
Conclusion
Published 2019“…The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Heart-design nexus: the emotion algorithm
Published 2025“…How might these approaches help create a world that is not just functionally efficient but emotionally enriching? …”
Get full text
Get full text
Book -
20
A novel approach based on machine learning and public engagement to predict water-scarcity risk in urban areas
Published 2022“…Climate change, population growth and urban sprawl have put a strain on water supplies across the world, making it difficult to meet water demand, especially in city regions where more than half of the world’s population now reside. …”
Get full text
Get full text
Article
