Search Results - (( java application rsa algorithm ) OR ( parameter implementation during algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy by Al-Dabbagh, Rawaa Dawoud, Neri, Ferrante, Idris, Norisma, Baba, Mohd Sapiyan

    Published 2018
    “…A trend that has emerged recently is to make the algorithm parameters automatically adapt to different problems during optimization, thereby liberating the user from the tedious and time-consuming task of manual setting. …”
    Get full text
    Get full text
    Article
  8. 8

    Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2015
    “…Exploitation and exploration mechanisms are the main components in metaheuristics algorithms. These mechanisms are implemented explicitly in ant colony system algorithm.The rate between the exploitation and exploration mechanisms is controlled using a parameter set by the users of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
    Get full text
    Get full text
    Article
  10. 10

    Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Optimal overcurrent relay solutions for protection coordination using metaheuristics approaches with penalty function method by Noor Zaihah, Jamal, Mohd Herwan, Sulaiman, Abdul, Nasir, Jabbar, Waheb A.

    Published 2024
    “…The algorithms are assisted with penalty function method during the selection of new agents/ offsprings to confirm the generations that violated the constraints are superseded during the next generation selection. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection by Iqbal, Muhammad

    Published 2023
    “…Moreover, its single tuning parameter and simple mathematical model make it easier to implement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Ant colony optimization in dynamic environments by Chen, Fei Huang

    Published 2010
    “…The last objective of this thesis is to optimize the parameter settings of the best performing ant algorithm with local search. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    The effect of job satisfaction on the relationship between organizational culture and organizational performance by Imran, Muhammad

    Published 2023
    “…Moreover, its single tuning parameter and simple mathematical model make it easier to implement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…Index test on the algorithm performance is carried out at different locations and atmospheric for example in an indoor area of KEE 009 laboratory (normal weather), the outdoor area of KEE 009 laboratory in normal weather, multi storey building and during thunderstorm weather. …”
    Get full text
    Get full text
    Thesis
  17. 17

    DRIVER FATIGUE ACCIDENT PREVENTION USING EYE BLINK SENSOR by AZIZAN, SITI ROSMA

    Published 2013
    “…This project is done by performing data collection through previous researches. The algorithms will be modified and implemented to validate the system. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Notably, the SPSA and GSPSA based methods only produced the optimal design parameter at the final iteration while it may keep a better design parameter during the tuning process if it has a memory feature. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…Notably, the SPSA and GSPSA based methods only produced the optimal design parameter at the final iteration while it may keep a better design parameter during the tuning process if it has a memory feature. …”
    Get full text
    Get full text
    Thesis