Search Results - (( evolution optimization conversion algorithm ) OR ( java applications rsa algorithm ))
Search alternatives:
- evolution optimization »
- conversion algorithm »
- java applications »
- applications rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy
Published 2019“…This stuffy proposed a novel optimization method labeled the "Differential Evolution Optimization Algorithm" (DEOA) to assess the reliability of power generation systems (PGS). …”
Get full text
Get full text
Conference or Workshop Item -
6
Comparative Study of Economic Dispatch by Using Various Optimization Techniques
Published 2014Get full text
Get full text
Conference or Workshop Item -
7
Optimization of emulsion polymerization of styrene and methyl methacrylate (MMA)
Published 2013“…The complexities of the process were represented by mathematical models for optimization and control. A process model involving the equations for mass and energy balance describing the particle evolution in a batch reactor and diffusion controlled kinetics is incorporated into the optimization framework. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…In the experiment, we conducted an evaluation of the effectiveness and efficiency of four nature-inspired binary algorithms for optimization namely Binary Particle Swarm Optimization (BPSO), Binary Grey Wolf Optimization algorithm (BGWO), Binary Differential Evolution algorithm (BDE), and Binary Salp Swarm algorithm (BSS) - in the context of human activity recognition (HAR). …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
Direct Tuning Phase-Shift Angle In Dab Dc-Dc Converter Using Moth Flame Optimization (Mfo) Algorithm
Published 2022“…Since the conventional tuning has a couple of downsides, mainly related to the time-consuming and inconsistence accuracy, the auto-tuning phase shift angle using Moth Flame Optimization (MFO) algorithm in DAB is proposed in this project. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Ant colony optimization and genetic algorithm models for suspended sediment discharge estimation for gorgan-river, Iran
Published 2011“…New models based on artificial intelligence models, namely; Ant Colony Optimization (ACO) and Genetic Algorithm (GA) are now being used more frequently to solve optimization problems. …”
Get full text
Get full text
Thesis
