Search Results - (( java implementation rsa algorithm ) OR ( knowledge creating optimization algorithm ))
Search alternatives:
- creating optimization »
- java implementation »
- implementation rsa »
- knowledge creating »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014“…As the internet is overload with information, various knowledge based systems are now equipped with data analytics features that facilitate knowledge discovery.This includes the utilization of optimization algorithms that mimics the behavior of insects or animals.This paper presents an experiment on document clustering utilizing the Gravitation Firefly algorithm (GFA).The advantage of GFA is that clustering can be performed without a pre-defined value of k clusters.GFA determines the center of clusters by identifying documents with high force.Upon identification of the centers, clusters are created based on cosine similarity measurement.Experimental results demonstrated that GFA utilizing a random positioning of documents outperforms existing clustering algorithm such as Particles Swarm Optimization (PSO) and K-means.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A near-optimal centroids initialization in K-means algorithm using bees algorithm
Published 2009“…This creates problem for novice users especially to those who have no or little knowledge on the data.Trial-error attempt might be one of the possible preference to deal with this issue.In this paper, an optimization algorithm inspired from the bees foraging activities is used to locate near-optimal centroid of a given data set.Result shows that propose approached prove it robustness and competence in finding a near optimal centroid on both synthetic and real data sets.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
9
Fuzzy genetic algorithms for combinatorial optimisation problems
Published 2012“…The Genetic Algorithms (GAs) have been very successful in handling optimization problems which are difficult. …”
Get full text
Get full text
Thesis -
10
Adaptive firefly algorithm for hierarchical text clustering
Published 2016“…As search engine operates on Internet content that is constantly being updated, there is a need for a clustering algorithm that offers automatic grouping of items without prior knowledge on the collection. …”
Get full text
Get full text
Get full text
Thesis -
11
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…This enables more controllability of reaching optimal learning without falling into sub-optimality because of over-fitting or under-fitting. …”
Get full text
Get full text
Thesis -
12
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…This algorithm maintains the local optimal radius of micro-clusters rather than a global and constant radius. …”
Get full text
Get full text
Thesis -
13
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…We have developed Metaheuristic algorithms includes the Genetic Algorithm (GA) and Ant Colony Optimization Algorithm (ACO), to solve the proposed model. …”
Get full text
Get full text
Article -
14
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…However, the important issue is how to measure the available bandwidth on an end-to-end overlay path without prior knowledge about the physical network. Over the last two decades, researchers have been trying to create algorithms to measure end-to-end available bandwidth and other bandwidth-related metrics accurately, quickly, and without affecting the traffic of the path. …”
Get full text
Get full text
Thesis -
15
Optimization of Sensor Location in Data Center
Published 2012“…Thus, this project aims to create a wireless temperature monitoring system with location optimization algorithm to optimize temperature sensors deployment/locations. …”
Get full text
Get full text
Final Year Project -
16
Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa
Published 2020“…Therefore, the installation of PV requires optimization process to identify the correct location and sizing. …”
Get full text
Get full text
Thesis -
17
Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour
Published 2022“…On that basis, the second contribution of this thesis is proposing a fast fuzzy evolutionary algorithm with minimal stochastic behaviour. Furthermore, this thesis contributes to the body of knowledge by introducing a novel method called Fuzzy Rough set Genetic Algorithm (FRGA) that take on efficiency of metaheuristics while reducing search space by leveraging the data mining aspect of rough set theory. …”
Get full text
Get full text
Get full text
Thesis -
18
Knowledge-based disk scheduling policy using fuzzy logic
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
19
Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim
Published 2023“…Machine learning model selection is an iterative process of exploring, evaluating, and improving algorithms. Selecting an optimal model for a particular domain is rigid, challenging, and complicated. …”
Get full text
Get full text
Thesis -
20
