Search Results - (( java implementation rsa algorithm ) OR ( ((using function) OR (using factor)) using algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using algorithm »
- using function »
- rsa algorithm »
- using factor »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
Modification of the ant colony optimization algorithm for solving multi-agent task allocation problem in agricultural application
Published 2024“…By employing such a function, simulation results show that the total resource used by the agents and total communication cost can be optimized. …”
Get full text
Get full text
Get full text
Article -
7
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm
Published 2021“…The newly proposed algorithm was tested using a set of standard benchmark functions with different searching space and global optima placement. …”
Get full text
Get full text
Get full text
Article -
9
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…This stochastic learning method is a useful addition to the existing methods for determining the center and smoothing factors of radial basis function neural networks, and it can also help the network more efficiently train. …”
Get full text
Get full text
Article -
10
Performance comparison of LFXLMS, MOVFXLMS and THF-NLFXLMS algorithms for Hammerstein NANC
Published 2016“…When using optimum leakage factors, these algorithms show close performance with benchmark nonlinear FXLMS (NLFXLMS) algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
11
Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network
Published 2022“…As for multi-objective functions associated with the optimisation problem, a weight-sum method is typically used to determine each objective function's coefficient factors (CF). …”
Get full text
Get full text
Get full text
Thesis -
12
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
13
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
14
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018“…In this research, swarming intelligence is used to solve optimisation problem. Grey Wolf Optimizer and Dragonfly Algorithm were chosen. …”
Get full text
Get full text
Monograph -
15
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Get full text
Article -
16
New heuristic function in ant colony system for job scheduling in grid computing
Published 2012“…Job scheduling is one of the main factors affecting grid computing performance. Job scheduling problem classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Ant colony system algorithm is a meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This paper focuses on enhancing the heuristic function where information about recent ants’ discoveries will be taken into account.Experiments were conducted using a simulator with dynamic environment features to mimic the grid environment.Results show that the proposed enhanced algorithm produce better output in term of utilization and make span.…”
Get full text
Get full text
Conference or Workshop Item -
17
New Complexity Weights for Function Point Analysis Using Artificial Neural Networks
Published 2004“…The last step is determining 14 technical complexity factors. Although, function points are widely used, they still have limitations. …”
Get full text
Get full text
Thesis -
18
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…The cost function used in this paper is based on the Kruppa’s equation. …”
Get full text
Get full text
Conference or Workshop Item -
19
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Get full text
Article -
20
FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation
Published 2022“…The SHA-256 hash function factor four hardware implementation was successfully tested using the Altera DE2-115 FPGA board. …”
Get full text
Get full text
Get full text
Get full text
Article
