Search Results - (( evolution information system algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- evolution information »
- java implementation »
- information system »
- implementation rsa »
- system algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Quality-driven scheduling for long-term evolution system
Published 2011“…This paper proposes a novel packet scheduling algorithm that extends Opportunistic and Delay Sensitive (ODS) algorithm to simultaneously support Guaranteed Bit Rate (GBR) and Non-GBR (NGBR) services over downlink Long Term Evolution (LTE) system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading
Published 2017Get full text
Get full text
Conference or Workshop Item -
11
An interactively recurrent functional neural fuzzy network with fuzzy differential evolution and its applications
Published 2015“…The traditional differential evolution (DE) method easily gets trapped in a local optimum during the learning process, but the proposed fuzzy differential evolution algorithm can overcome this shortcoming. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Performance analysis of two packet scheduling algorithms in downlink 3GPP LTE system
Published 2010Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Evaluation of Search Result of Document Search Based GA (DSEGA)
Published 2004“…It is composed by a series of module that using information retrieval method and genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Delay-Prioritized Scheduling (DPS) for Real Time Traffic in 3GPP LTE System
Published 2010“…This has imposed new challenges in the design of packet scheduling algorithms in these systems. To address those challenges, a new packet scheduling algorithm for real time (RT) traffic in downlink third generation partnership project long term evolution (3GPP LTE) system is proposed in this paper. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Hybrid Meta-Heuristic Algorithms For Solving Vehicle Routing Problems
Published 2021Get full text
Get full text
Thesis -
20
Performance analysis on automated and average channel quality information (CQI) reporting algorithm in LTE-A
Published 2016“…Robust service can be achieved in error prone Long Term Evolution-Advanced (LTE-A) by dealing with imperfect Channel Quality Information (CQI). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
