Search Results - (( java implementation rsa algorithm ) OR ( parameter data virtualization algorithm ))
Search alternatives:
- virtualization algorithm »
- java implementation »
- data virtualization »
- implementation rsa »
- rsa algorithm »
- parameter »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction
Published 2025“…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
A review energy-efficient task scheduling algorithms in cloud computing
Published 2023Conference Paper -
12
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
-
16
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The MAC algorithm was developed in MATLAB environment and was applied on virtual sinogram which directly computed through forward projection of CT images. …”
Get full text
Get full text
Thesis -
17
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Modeling of cupping suction system based on system identification method
Published 2022“…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). Moreover, there is a tool in MATLAB called System Identification Toolbox that can help to collect real measurement data samples. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Evolutionary tuning of modular fuzzy controller for two-wheeled wheelchair
Published 2012“…General rules of thumb allow heuristic tuning (trial and error) of the parameters but such heuristic method does not guarantee that the system tuned with current data set will represent future system states. …”
Get full text
Get full text
Get full text
Article -
20
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The ACO algorithm in the Bluetooth M-LPNWSN system reduces energy consumption by 60% over 500 iterations and significantly improves data delivery rates by adapting dynamically to network topology and traffic. …”
Get full text
Get full text
Get full text
Thesis
