Search Results - (( java implementation rsa algorithm ) OR ( knowledge creating optimization algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Document clustering for knowledge discovery using nature-inspired algorithm by Mohammed, Athraa Jasim, Yusof, Yuhanis, Husni, Husniza

    Published 2014
    “…As the internet is overload with information, various knowledge based systems are now equipped with data analytics features that facilitate knowledge discovery.This includes the utilization of optimization algorithms that mimics the behavior of insects or animals.This paper presents an experiment on document clustering utilizing the Gravitation Firefly algorithm (GFA).The advantage of GFA is that clustering can be performed without a pre-defined value of k clusters.GFA determines the center of clusters by identifying documents with high force.Upon identification of the centers, clusters are created based on cosine similarity measurement.Experimental results demonstrated that GFA utilizing a random positioning of documents outperforms existing clustering algorithm such as Particles Swarm Optimization (PSO) and K-means.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A near-optimal centroids initialization in K-means algorithm using bees algorithm by Mahmuddin, Massudi, Yusof, Yuhanis

    Published 2009
    “…This creates problem for novice users especially to those who have no or little knowledge on the data.Trial-error attempt might be one of the possible preference to deal with this issue.In this paper, an optimization algorithm inspired from the bees foraging activities is used to locate near-optimal centroid of a given data set.Result shows that propose approached prove it robustness and competence in finding a near optimal centroid on both synthetic and real data sets.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Fuzzy genetic algorithms for combinatorial optimisation problems by Varnamkhasti, Mohammad Jalali

    Published 2012
    “…The Genetic Algorithms (GAs) have been very successful in handling optimization problems which are difficult. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim

    Published 2016
    “…As search engine operates on Internet content that is constantly being updated, there is a need for a clustering algorithm that offers automatic grouping of items without prior knowledge on the collection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…This enables more controllability of reaching optimal learning without falling into sub-optimality because of over-fitting or under-fitting. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…This algorithm maintains the local optimal radius of micro-clusters rather than a global and constant radius. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Meta-Heuristic Algorithms for Learning Path Recommender at MOOC by Son, N.T., Jaafar, J., Aziz, I.A., Anh, B.N.

    Published 2021
    “…We have developed Metaheuristic algorithms includes the Genetic Algorithm (GA) and Ant Colony Optimization Algorithm (ACO), to solve the proposed model. …”
    Get full text
    Get full text
    Article
  14. 14

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…However, the important issue is how to measure the available bandwidth on an end-to-end overlay path without prior knowledge about the physical network. Over the last two decades, researchers have been trying to create algorithms to measure end-to-end available bandwidth and other bandwidth-related metrics accurately, quickly, and without affecting the traffic of the path. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimization of Sensor Location in Data Center by ., Pramita Winata

    Published 2012
    “…Thus, this project aims to create a wireless temperature monitoring system with location optimization algorithm to optimize temperature sensors deployment/locations. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa by Syed Mustaffa, Sharifah Azma

    Published 2020
    “…Therefore, the installation of PV requires optimization process to identify the correct location and sizing. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour by Hadi , Naghavipour

    Published 2022
    “…On that basis, the second contribution of this thesis is proposing a fast fuzzy evolutionary algorithm with minimal stochastic behaviour. Furthermore, this thesis contributes to the body of knowledge by introducing a novel method called Fuzzy Rough set Genetic Algorithm (FRGA) that take on efficiency of metaheuristics while reducing search space by leveraging the data mining aspect of rough set theory. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim by Halim, Zulkifli

    Published 2023
    “…Machine learning model selection is an iterative process of exploring, evaluating, and improving algorithms. Selecting an optimal model for a particular domain is rigid, challenging, and complicated. …”
    Get full text
    Get full text
    Thesis
  20. 20