Search Results - (( java implementation rsa algorithm ) OR ( program effectiveness during algorithm ))
Search alternatives:
- program effectiveness »
- effectiveness during »
- java implementation »
- implementation rsa »
- during algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Multithreading Prioritization Concurrently by using an Effective Dynamic Slicing Algorithm
Published 2014Get full text
Get full text
Conference or Workshop Item -
7
Development of dynamic programming algorithm for maintenance scheduling problem
Published 2020“…Using the dynamic programming algorithm developed, the model was also able to recalculate alternative schedules by replacing unavailable teams with other teams to avoid delays. …”
Get full text
Get full text
Thesis -
8
Differential equation fault location algorithm with harmonic effects in power system
Published 2023“…The network model is simulated using the alternate transients program (ATP)Draw simulation program. Several fault scenarios have been implemented during the simulation, such as fault resistance, fault distance, and fault inception angle. …”
Get full text
Get full text
Get full text
Article -
9
A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch
Published 2016“…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
Get full text
Get full text
Get full text
Article -
10
A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults
Published 2019“…During program testing, software programs may be discovered to contain multiple faults. …”
Get full text
Get full text
Article -
11
-
12
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…The re-execution of all test cases during the regression testing is costly. And even though several of the code based addresses procedural programs. …”
Get full text
Get full text
Conference or Workshop Item -
13
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…The re-execution of all test cases during regression testing will be costly. The effective and efficient test case selection from the existing test suite becomes very critical issue in regression testing. …”
Get full text
Get full text
Get full text
Article -
14
Effect of viscous dampers on yielding mechanisms of RC structures during earthquake
Published 2015“…A special finite element computer program was codified based on the developed algorithm. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…We introduced a method that combines a compromise programming (CP) approach and metaheuristic algorithms, including the genetic algorithm (GA) and ant colony optimization (ACO), to solve the proposed optimization problem. …”
Get full text
Get full text
Article -
17
Schedule of tour guide using genetic algorithm / Nur Aishah Rosli
Published 2017Get full text
Get full text
Thesis -
18
Effective software fault localization based on complex network theory / Abubakar Zakari
Published 2019“…FLCN-S shows significant improvement in terms of localization effectiveness on single-fault programs in comparison with Ochiai based and Jaccard-based techniques. …”
Get full text
Get full text
Get full text
Thesis -
19
Quality checking and inspection based on machine vision technique to determine tolerancevalue using single ceramic cup
Published 2017“…It is also designed to track specific colour of product and conduct the inspection process. Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
Get full text
Get full text
Get full text
Article -
20
Quality checking and inspection based on machine vision technique to determine tolerance value using single ceramic cup
Published 2016“…It is also designed to track specific color of product and conduct the inspection process. Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
Get full text
Get full text
Get full text
Article
