Search Results - (( java application rsa algorithm ) OR ( var optimization based algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Optimization of neural network through genetic algorithm searches for the prediction of international crude oil price based on energy products prices by Chiroma, Haruna, Ya’u Gital, Abdulsalam, Abubakar, Adamu, Usman, Mohammed Joda, Waziri, Usman

    Published 2014
    “…This study investigated the prediction of crude oil price based on energy product prices using genetically optimized Neural Network (GANN). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Optimal design of three-phase static var compensation system by George M., Bakar M.B.B.A., Basu K.P.

    Published 2023
    “…An optimal design for three-phase SVC system based on SDM is considered. …”
    Conference paper
  8. 8

    Sensitivity-based fuzzy multi-objective portfolio model with Value-at-Risk by Zhang, H., Watada, J., Wang, B.

    Published 2019
    “…In addition, compared with the VaR-FMOPSM model, our sensitivity-based improved model with the IPSO algorithm also performs better than Genetic Algorithm and Simulate Anneal Algorithm (SA), it provides the same performance on this point. …”
    Get full text
    Get full text
    Article
  9. 9

    Transmission loss minimization using SVC based on particle swarm optimization by Jumaat, S.A., Musirin, I., Othman, M.M., Mokhlis, Hazlie

    Published 2011
    “…This paper describes optimal sizing of static var compensator (SVC) based on Particle Swarm Optimization for minimization of transmission losses considering cost function. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Optimal location and sizing of SVC using Particle Swarm Optimization technique by Jumaat, S.A., Musirin, I., Othman, M.M., Mokhlis, Hazlie

    Published 2011
    “…This paper describes optimal location and sizing of static var compensator (SVC) based on Particle Swarm Optimization for minimization of transmission losses considering cost function. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement by Karami, Mahdi

    Published 2011
    “…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Evaluating Adan vs. Adam: an analysis of optimizer performance in deep learning by Ismail, Amelia Ritahani, Azhary, Muhammad Zulhazmi Rafiqi, Hitam, Nor Azizah

    Published 2025
    “…With various optimization algorithms available, choosing the one that best suits the deep learning model and dataset can make a substantial difference in achieving optimal results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    An Empirical Study on the Construction of A Non-Convex Risk Parity Portfolio using a Genetic Algorithm by Kusumawati, Rosita, Rosadi, Dedi, Abdurakhman, Abdurakhman

    Published 2025
    “…Risk-based portfolio optimization has become increasingly crucial due to the limitations and underperformance of traditional Mean-Variance (MV) portfolios. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Hyper-heuristic strategies for optimal power flow problem with FACTS devices allocation in wind power integrated system by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2024
    “…These low-level metaheuristics comprise the Moth-Flame Optimizer (MFO), Barnacles Mating Optimizer (BMO), Teaching-Learning Based Optimization (TLBO) and Gradient-Based Optimizer (GBO). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    On the Application of heuristic Method and Saddle Node Bifurcation for Optimal Placement of FACTS Devices in Power System by Mariun, Norman, Ab Kadir, Mohd Zainal Abidin, Karami, Mehdi

    Published 2011
    “…This study focuses on an optimal placement of five major types of FACTS devices, namely, Static Var Compensator (SVC), Thyristor Controlled Series Compensator (TCSC), Static Synchronous Compensator (STATCOM), Static Synchronous Series Compensator (SSSC) and Unified Power Flow Controller (UPFC) in power system network using a well-known and applicable heuristic method known as genetic algorithm to seek the optimum location and setting of these controllers in the system. …”
    Get full text
    Get full text
    Article
  19. 19

    Computational intelligence based technique for congestion management and compensation scheme in power system / Nur Zahirah Mohd Ali by Mohd Ali, Nur Zahirah

    Published 2019
    “…CEPSO integrates the element of cloning and swarm in the original Evolutionary Programming algorithm. CEPSO is initially used to optimize the location and sizing of FACTS devices for compensation scheme. …”
    Get full text
    Get full text
    Thesis