Search Results - (( java implementation rsa algorithm ) OR ( basic optimisation research algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor by Ramli, Mohamad Raziff, Abal Abas, Zuraida, Desa, Mohammad Ishak, Zainal Abidin, Zaheera, Al Azzam, Malik Bader Hasan

    Published 2019
    “…Benchmark test function is then performed for the basic Bat Algorithm and the modified Bat Algorithm (MBA) for comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman by Che Othman, Muhammad Nazree

    Published 2013
    “…The developed technique was tested on the 10 generating units test system then up to 20 generating units in a 24-hours scheduling period and the results was compared with the basic EP, Evolutionary Programming with Priority Listing (EP-PL) and Multi-agent Evolutionary Programming (MAEP) optimisation techniques. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Determining optimal transportation allocation using linear programming methods / Tengku Mohd Hazimi Tuan Hassan and Maslin Masrom by Tuan Hassan, Tengku Mohd Hazimi, Masrom, Maslin

    Published 2022
    “…A case study of an operations research problem involving the optimisation of distribution costs and the effective delivery system of inventory by utilising transportation models, namely the North-West Corner Rule (NWCR), Simplex method, and Vogel's Approximation Method (VAM) are presented and discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…Therefore, by considering tracking as an optimisation problem, the proposed SwATrack algorithm searches for the optimal distribution of motion model without making prior assumptions, or prior learning of the motion model. …”
    Get full text
    Get full text
    Thesis