Search Results - (( ii optimization mining algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Evaluation of data mining models for predicting concrete strength by Wong, Chuan Ming

    Published 2024
    “…The Particle Swarm Optimization algorithm is able to generate optimal values for the concrete features that maximizes the strength of concrete. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability by Romli, Nurul Atiqah

    Published 2024
    “…The proposed algorithm in the retrieval phase showed optimal performance as compared to the baseline algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An application of IPA approach on the optimization of a mining port stockyard system by Ayu, Media Anugerah, Cardew-Hall, Michael

    Published 2002
    “…Perturbation Analysis Robbins Monro Single Run (PARMSR) algorithm were applied in the optimization of sub-system 1 and rules devised to determining optimal operating condition in sub-system 2. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Hence, this thesis presents the optimization of parameters values for the tree-based method by genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Accelerated mine blast algorithm for ANFIS training for solving classification problems by Mohd Salleh, Mohd Najib, Hussain, Kashif

    Published 2016
    “…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20