Search Results - (( evolution simulation based algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading by Hadi, Mahmood Khalid, Othman, Mohammad Lutfi, Abdul Wahab, Noor Izzri

    Published 2017
    “…Simulation results for various N − 1 contingency conditions within the considered power system under base case load are proposed and validated with those results from the Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter by Kamisman, Norazelina

    Published 2018
    “…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Evolution of RF-signal cognition for wheeled mobile robots using pareto multi-objective optimization by Chin, Kim On, Teo, Jason Tze Wi

    Published 2009
    “…A mobile robot is simulated in a 3D, physics-based environment for the RF-localization behavior. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A study on channel and delay-based scheduling algorithms for live video streaming in the fifth generation long term evolution-advanced by Abdul Latiff, Liza, Mohd Ramli, Huda Adibah, Asnawi, Ani Liza, Abdul Wahab, Nur Haliza

    Published 2022
    “…This paper will investigate the performance of a number of channel and delay-based scheduling algorithms for an efficient QoS (Quality of Service) provision with more live video streaming users over the Fifth Generation Long-Term Evolution-Advanced (5G LTE-A) network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading by Othman, Mohammad Lutfi, Hadi, Mahmood Khalid, Abdul Wahab, Noor Izzri

    Published 2017
    “…Simulation results for various N − 1 contingency conditions within the considered power system under base case load are proposed and validated with those results from the Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Book Section
  16. 16
  17. 17

    Comparison between scheduling techniques in long term evolution by Habaebi, Mohamed Hadi, Chebil, Jalel, Al-Sakkaf, A.G., Dahawi, T. H.

    Published 2013
    “…The scheduling algorithms performances on the downlink were measured in terms of throughput and block error rate using a MATLAB-based system level simulation. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Resource allocation in coordinated multipoint long term evolution-advanced networks by Katiran, Norshidah

    Published 2015
    “…Simulation study shows that the ORA algorithm improves the network sum-rate and fairness index up to 70% and 25%, respectively and reduces the average transmit power by 41% in relative to LRA algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The simulation process was conducted using Network Simulator-3 (NS-3) and the performance of these packet scheduling algorithms were evaluated based on the performance metrics of throughput, delay, packet loss ratio (PLR), energy consumption rate (ECR), and EE for the voice over IP (VoIP), video and File Transfer Protocol (FTP) applications. …”
    Get full text
    Get full text
    Thesis