Search Results - (( java implementation rsa algorithm ) OR ( programming approach evolution algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Sub-route reversal repair mechanism and differential evolution for urban transit network design problem by Tarajo, Buba Ahmed

    Published 2017
    “…This thesis considers the urban transit network design problem (UTNDP) focusing on the implementation of population-based metaheuristic approaches, specifically on differential evolution (DE) and particle swarm optimization (PSO). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Comparative Study of Economic Dispatch by Using Various Optimization Techniques by Hong, Mee Song, M. H., Sulaiman, Mohd Rusllim, Mohamed, Wong, Lo Ing

    Published 2014
    “…The optimization techniques used in this paper to do the comparison are Quadratic Programming (QP), Artificial Bee Colony (ABC), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Differential Evolution (DE) and Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization by Goh, Khang Wen

    Published 2019
    “…In the analysis of the literature, Artificial Bees Colony (ABC) Algorithm has been selected as the metaheuristic approach to be improved its capability and efficiency to solve the global optimization problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A Data Mining-Based Model for Assessing Guangzhou's Higher Vocational Colleges 'New Energy Automobile Majors' Vocational Skills by He, Ling, Hamid, Hashima

    Published 2024
    “…The approach employs algorithms for data mining to enhance the accuracy and accessibility of results through the use of Random Forest (RF) and Generalized Additive Models (GAM) in a layering architecture. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Selective exposure in the digital age: a systematic review of the mechanisms, contexts, and sociopsychology implications for media ecosystems(2013-2023) by Chi, Jinglin, Kamarudin, Syafila

    Published 2025
    “…Selective exposure is a complex phenomenon, and this study takes a systematic approach to reviewing its manifestations in the changing environment of new media. …”
    Get full text
    Get full text
    Get full text
    Article