Search Results - (( java implementation rsa algorithm ) OR ( based computing cell algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- based computing »
- computing cell »
- cell algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
BASE: a bacteria foraging algorithm for cell formation with sequence data
Published 2010“…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced cell-based algorithm with dynamic radius in solving capacitated multi-source weber problem
Published 2021“…Random selection of facility location in a Cell-based approach may cause infeasible or worse solutions. …”
Get full text
Get full text
Thesis -
9
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Cells are formed based on presuming fixed single route and parts demand (traditional cell formation) or fluctuation of parts demand (dynamic cell formation). …”
Get full text
Get full text
Thesis -
10
Energy management strategies, control systems, and artificial intelligence-based algorithms development for hydrogen fuel cell-powered vehicles: A review
Published 2025“…EMS strategies; AI-based algorithms categories, functions and hybridization; the state-of-art and future direction of AI-based algorithms and HFCEVs? …”
Review -
11
Computer-aided acute leukemia blast cells segmentation in peripheral blood images
Published 2015“…The method also introduces an approach to split overlapping cells using the marker-controlled watershed algorithm based on a new marker selection scheme. …”
Get full text
Article -
12
Genetic algorithms for VLSI micro-Cell layout area optimization based on binary tree
Published 2009Get full text
Working Paper -
13
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
14
Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations
Published 2013“…The BFO algorithm is used to create machine cells and part families. …”
Get full text
Get full text
Article -
15
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…In practice, most of studies apply a straightforward approach for evaluation where appropriate performance metrics such as classification accuracy is selected, computes the mean and its variance over several repetitive experiments, and then compares it with the base algorithm or other comparative approach. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…The monitoring and visualization of tumor cells growth are based on the large scale mathematical simulation. …”
Get full text
Get full text
Get full text
Get full text
Book -
20
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…In practice, only a very small number of passes are typicaUy needed. To deal with cells of various size , the algorithm progresses by moving one cell at a time between the blocks of the partition while maintaining a desired based on the size of the blocks rather than the number of cells per block. …”
Get full text
Get full text
Thesis
