Search Results - (( java implementation rsa algorithm ) OR ( parameter program end algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- rsa algorithm »
- end algorithm »
- program end »
- parameter »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Optimization of milling parameters using ant colony optimization
Published 2008“…The result obtained from this simulation will compare with another method like Genetic Algorithm (GA) and Linear Programming Technique (LPT) to validation. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Improvement of surface roughness in end milling of Ti6Al4V by coupling RSM with genetic algorithm
Published 2011“…This paper describes mathematically the effect of cutting parameters on Surface roughness in end milling of Ti6Al4V. …”
Get full text
Get full text
Get full text
Article -
8
Benchmark studies on Optimal Reactive Power Dispatch (ORPD) Based Multi-Objective Evolutionary Programming (MOEP) using Mutation Based on Adaptive Mutation Operator (AMO) and Polyn...
Published 2016“…The performance of a Multi-Objective Evolutionary Programming (MOEP) is significantly dependent on the parameter setting of the operator. …”
Get full text
Get full text
Get full text
Article -
9
Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment
Published 2017“…For these proposed approaches, this study adopted a hybridization of a fuzzy programming, modify simulated annealing, and simplex downhill (SD) algorithm called Fuzzy-MSASD to resolve multiple objective linear programming APP problems in a fuzzy environment. …”
Get full text
Get full text
Thesis -
10
Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub...
Published 2014“…In doing so, Multi-Parametric Programming technique is used to develop the computer algorithm; whereas Model-Based Predictive Control (MPC) is adopted for the design of the controller. …”
Get full text
Get full text
Monograph -
11
Optimal Strategy for Comfort-Based Home Energy Management System Considering Impact of Battery Degradation Cost Model
Published 2024“…In this paper, a novel scheduling algorithm based on a mixed-integer programming (MIP) model is proposed for the HEMS. …”
Article -
12
Decision tree method for fault causes classification based on RMS-DWT analysis in 275 kV transmission lines network
Published 2021“…The proposed algorithm is based upon the root mean square (RMS) current duration, voltage dip, and discrete wavelet transform (DWT) measured at the sending end of a line and the decision tree method, a commonly accessible measurable method. …”
Get full text
Get full text
Article -
13
Decision tree method for fault causes classification based on rms-dwt analysis in 275 kv transmission lines network
Published 2023“…The proposed algorithm is based upon the root mean square (RMS) current duration, voltage dip, and discrete wavelet transform (DWT) measured at the sending end of a line and the decision tree method, a commonly accessible measurable method. …”
Article -
14
Development of a multi-objective optimization model for transport and environment in a closed-loop automotive supply chain
Published 2014“…The Multiobjective GSA (MOGSA) algorithm is adopted and then programmed using MATLAB software particularly to the MOACLSC. …”
Get full text
Get full text
Thesis -
15
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
16
Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient
Published 2010“…Then, the various specializations are described, accompanied with relevant references to illustrate the pitfalls and shortcomings, as well as the advantages, as compared to other methods. So finally, their algorithms are easily programmable on computer. The computation of reflection coefficient of the corn was programmed using MATLAB software for the admittance approach and Method of Moment (MOM). …”
Get full text
Get full text
Thesis -
17
ANN-based mango external quality grading system
Published 2017“…There are several types of algorithms that have been used to extract the features of fruit characters based on the physical parameters by capturing the fruit image and from the extracted information, those samples (mango fruit) will be detected, graded and sorted accordingly to the desired quality. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…Apriori is a popular algorithm in finding frequent set of items in data and association rule. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…The simulation result on different nodes showed that the proposed algorithm on Signcryption Obfuscatable and Steganography-PadSteg (SOS) performs 25% reasonably well as expected. …”
Get full text
Get full text
Thesis -
20
A Sensorless Positioning System For Linear Dc Motor
Published 2008“…Linear relation between motor position and timing parameters used in control algorithms has been studied and linear equations have been derived. …”
Get full text
Get full text
Thesis
