Search Results - (( java implementation rsa algorithm ) OR ( program end optimization algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- end optimization »
- rsa algorithm »
- program end »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A Constraint Programming-based Genetic Algorithm (CPGA) for Capacity Output Optimization
Published 2014“…Purpose: The manuscript presents an investigation into a constraint programming-based genetic algorithm for capacity output optimization in a back-end semiconductor manufacturing company. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Optimization of milling parameters using ant colony optimization
Published 2008“…The result obtained from this simulation will compare with another method like Genetic Algorithm (GA) and Linear Programming Technique (LPT) to validation. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
11
-
12
Economical optimization of conductor selection in planning radial distribution networks
Published 1999“…A new computer algorithm and program is presented for selection of optimal conductor type and size for each feeder segment. …”
Get full text
Get full text
Article -
13
ECONOMICAL OPTIMIZATION OF CONDUCTOR SELECTION IN PLANNING RADIAL DISTRIBUTION NETWORKS
Published 1999“…A new computer algorithm and program is presented for selection of optimal conductor type and size for each feeder segment. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimal Strategy for Comfort-Based Home Energy Management System Considering Impact of Battery Degradation Cost Model
Published 2024“…In this paper, a novel scheduling algorithm based on a mixed-integer programming (MIP) model is proposed for the HEMS. …”
Article -
15
Benchmark studies on Optimal Reactive Power Dispatch (ORPD) Based Multi-Objective Evolutionary Programming (MOEP) using Mutation Based on Adaptive Mutation Operator (AMO) and Polyn...
Published 2016“…A computer program was written in MATLAB. At the end, the result was compared with the Polynomial Mutation Operator.…”
Get full text
Get full text
Get full text
Article -
16
-
17
A genetic algorithm for solving single level lotsizing problems
Published 2003“…The combination of the population-generating heuristic with genetic algorithm results in a faster convergence in finding the optimal lot-sizing scheme due to the guaranteed feasibility of the initial population.…”
Get full text
Get full text
Article -
18
Optimization technique with sensitivity analysis on menu scheduling for boarding school student aged 13-18 using “Sufahani-Ismail Algorithm”
Published 2018“…Menu arranging is a known optimization problem. Therefore Binary Programming alongside optimization technique and “Sufahani-Ismail Algorithm” were utilized to take care of this issue. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Optimized fast fourier transform architecture using instruction set architecture extension in low-end digital signal controller
Published 2018“…Compared to the initial processor architecture, the support of extended ISA has increased the UTeMRISC core by 21.8% but at the same time allows to execute Fast Fourier Transform algorithm up to 5× faster. The combine effort of ISA extension and optimized instruction set generation results in up to 1 Mega sample per second, which translated to 66.8% increase of data throughput in the FFT algorithm when compared to a 32-bit architecture. …”
Get full text
Get full text
Get full text
Thesis -
20
