Search Results - (( java implementation rsa algorithm ) OR ( program evaluation modified algorithm ))
Search alternatives:
- java implementation »
- evaluation modified »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations
Published 2016“…It performs well in both steady state and dynamic operations as compared to the Modified W-H ADALINE algorithm.…”
Get full text
Get full text
Article -
7
Improved ADALINE harmonics extraction algorithm for boosting performance of photovoltaic shunt active power filter under dynamic operations
Published 2016“…It performs well in both steady state and dynamic operations as compared to the Modified W-H ADALINE algorithm.…”
Get full text
Get full text
Get full text
Article -
8
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…A case study conducted with USIM Tamhidi programs to evaluate the Hybrid-IWD algorithm has produced a successful Tamhidi exam timetable in comparison with manual approach.…”
thesis::doctoral thesis -
9
-
10
-
11
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
12
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
Get full text
Get full text
Get full text
Article -
13
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
14
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
15
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Lettuce Leaf Disease Detection Using Convolutional Neural Network Algorithm
Published 2023“…The detection algorithm will be develop based on a modified AlexNet model. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
A matlab-based graphical user interface (GUI) to predict the food quality during frying process
Published 2022“…Then, the sum squared error (SSE) of modified model was compared with the SSE of existing model. …”
Get full text
Thesis -
18
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
Get full text
Get full text
Get full text
Article -
19
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
Get full text
Get full text
Get full text
Article -
20
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…The performance of the proposed MDEP algorithm was evaluated using the IEEE 30-bus, IEEE 39-bus, and IEEE 118-bus test systems. …”
text::Thesis
