Search Results - (( java application rsa algorithm ) OR ( parameter implementation during algorithm ))
Search alternatives:
- parameter implementation »
- implementation during »
- java application »
- during algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
Get full text
Get full text
Thesis -
7
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
Published 2018“…A trend that has emerged recently is to make the algorithm parameters automatically adapt to different problems during optimization, thereby liberating the user from the tedious and time-consuming task of manual setting. …”
Get full text
Get full text
Article -
8
Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing
Published 2015“…Exploitation and exploration mechanisms are the main components in metaheuristics algorithms. These mechanisms are implemented explicitly in ant colony system algorithm.The rate between the exploitation and exploration mechanisms is controlled using a parameter set by the users of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
Get full text
Get full text
Article -
10
Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin
Published 2014“…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
Get full text
Get full text
Thesis -
11
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimal overcurrent relay solutions for protection coordination using metaheuristics approaches with penalty function method
Published 2024“…The algorithms are assisted with penalty function method during the selection of new agents/ offsprings to confirm the generations that violated the constraints are superseded during the next generation selection. …”
Get full text
Get full text
Get full text
Article -
13
Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection
Published 2023“…Moreover, its single tuning parameter and simple mathematical model make it easier to implement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Ant colony optimization in dynamic environments
Published 2010“…The last objective of this thesis is to optimize the parameter settings of the best performing ant algorithm with local search. …”
Get full text
Get full text
Get full text
Thesis -
15
The effect of job satisfaction on the relationship between organizational culture and organizational performance
Published 2023“…Moreover, its single tuning parameter and simple mathematical model make it easier to implement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…Index test on the algorithm performance is carried out at different locations and atmospheric for example in an indoor area of KEE 009 laboratory (normal weather), the outdoor area of KEE 009 laboratory in normal weather, multi storey building and during thunderstorm weather. …”
Get full text
Get full text
Thesis -
17
DRIVER FATIGUE ACCIDENT PREVENTION USING EYE BLINK SENSOR
Published 2013“…This project is done by performing data collection through previous researches. The algorithms will be modified and implemented to validate the system. …”
Get full text
Get full text
Final Year Project -
18
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
Get full text
Get full text
Thesis -
19
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Notably, the SPSA and GSPSA based methods only produced the optimal design parameter at the final iteration while it may keep a better design parameter during the tuning process if it has a memory feature. …”
Get full text
Get full text
Thesis -
20
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Notably, the SPSA and GSPSA based methods only produced the optimal design parameter at the final iteration while it may keep a better design parameter during the tuning process if it has a memory feature. …”
Get full text
Get full text
Thesis
