Search Results - (( java application rsa algorithm ) OR ( problem implication based algorithm ))
Search alternatives:
- problem implication »
- implication based »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. …”
Get full text
Get full text
Book Section -
8
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Then apply the MODE-based algorithm to optimize the weighting function of the control problem formulation for optimal performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…Thus, this research aims to standardize and weigh the evaluation criteria of MaOO competitive algorithms base on fuzzy Delphi and new fuzzy-weighted zero-inconsistency (FWZIC) methods. …”
Get full text
Get full text
Thesis -
10
Computing the maximum violation of a Bell inequality is an NP-problem
Published 2016“…The proof that the optimization of such correlation measure is an NP-problem based on an operational perspective involving a Turing machine, which follows a general algorithm. …”
Get full text
Get full text
Article -
11
-
12
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
13
The effectiveness of problem-based serious games on learning and learning motivation in the context of 3D computer graphics / Meisam Moradi
Published 2022“…This study and the game design in this study can have pedagogical and practical implications for 3D computer graphics lecturers and those who are interested in designing effective problem-based SGs. …”
Get full text
Get full text
Get full text
Thesis -
14
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Therefore, a new space-time fuzzy implication operator is introduced, by modifying the existing implication operators to accommodate time as an added dimension. …”
Get full text
Get full text
Thesis -
15
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Design/methodology/approach: The genetic algorithm methodology implements a genetic algorithm that is augmented by application specific heuristics in order to guide the search for an optimal solution. …”
Get full text
Get full text
Get full text
Article -
16
A hybrid deep learning-based unsupervised anomaly detection in high dimensional data
Published 2022“…Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. Many issues in this field still unsolved, so several modern anomaly detection methods struggle to maintain adequate accuracy due to the highly descriptive nature of big data. …”
Get full text
Get full text
Article -
17
A balanced partitioning mechanism for multicontroller placement in software-defined wide area networks
Published 2022“…Consequently, the objective of this study is to propose a Balanced Partitioning Mechanism (BPM) based on the notion of a network partition. Moreover, the BPM is designed based on a modified K-means algorithm. …”
Get full text
Get full text
Thesis -
18
Evaluation and optimization of frequent, closed and maximal association rule based classification
Published 2014“…On the other hand maximal itemset based association rules, that are a subset of closed itemset based rules, show to be insufficient in this regard, and typically will have worse recall and generalization power. …”
Get full text
Get full text
Article -
19
Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL)
Published 2019“…To achieve these goals, computational mathematics problem based learning (CM-PBL) instructional strategy is developed to promote an active learning environment for classroom management involving problem solving. …”
Get full text
Get full text
Conference or Workshop Item -
20
Pemahaman guru matematik Tahun Enam tentang pembahagian nombor bulat / Hoi Sim Min
Published 2018“…This study also found that teachers have four general patterns of thought and an algorithm to solve the problem of division of whole numbers, that is, the general pattern of thought of partition, measurement, repeated subtraction, the inverse of multiplication , and long division algorithm. …”
Get full text
Get full text
Get full text
Thesis
