Search Results - (( java implementation rsa algorithm ) OR ( knowledge level optimization algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- level optimization »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
8
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…Trends and perspectives in dynamic environments point towards a need for optimal operating levels in reconfigurable manufacturing activities. …”
Get full text
Get full text
Thesis -
9
Enhancement of lightweight block cipher algorithms
Published 2017“…Third, there is lack knowledge on key dependent S-box within lightweight algorithms. …”
Get full text
Get full text
Book -
10
A Review on energy consumption optimization techniques in IoT based smart building environments
Published 2019“…The gaps in the literature are due to advancements in technology, the drawbacks of optimization algorithms, and the introduction of new optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper -
12
Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper
Published 2022“…In this paper, MR fluid damper with Fuzzy-PID controller is examined to be optimized using a modified DE algorithm. However, in the Fuzzy-PID controller, the fuzzy logic algorithm is used to auto-tune the PID controller, but it cannot be considered as a fully real-time controller since the fuzzy algorithm uses a previous knowledge base built offline. …”
Get full text
Get full text
Article -
13
-
14
A review on energy consumption optimization techniques in IoT based smart building environment
Published 2019“…The gaps in the literature are due to advancements in technology, the drawbacks of optimization algorithms and the introduction of new optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Smart waste management system with IoT monitoring
Published 2023Get full text
Get full text
Get full text
Article -
17
Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman
Published 2017“…This study made an attempt to incorporate knowledge transfer-related variables (articulability of knowledge, credibility of knowledge source, gap of theory-practice, embedded knowledge and environmental uncertainty) into the framework. …”
Get full text
Get full text
Book Section -
18
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Experimental results show that our proposed privacy algorithm is able to work effectively in terms of privacy level (12.01 against 10.48), efficiency (2.74ms against 3.84ms) and scalability (470.15ms against 507.48ms), when dealing with multivariate traffic attributes. …”
Get full text
Get full text
Thesis -
19
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The results obtained are then analysed to assess the proposed solution’s performance in obtaining each deployment objective’s optimal value. Finally, the proposed algorithm’s effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
20
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The results obtained are then analysed to assess the proposed solution's performance in obtaining each deployment objective's optimal value. Finally, the proposed algorithm's effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis
