Search Results - (( java implementation rsa algorithm ) OR ( programming problem evaluation algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison Between Linear Programming And Integer Linear Programming: A Review by Sam, Mei Lee, Saptari, Adi, Salleh, Mohd Rizal, Mohamad, Effendi

    Published 2018
    “…Three criteria were used to evaluate the characteristics: time complexity, problem size and computational time. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem by Ngo, T.S., Jaafar, J., Aziz, I.A., Aftab, M.U., Nguyen, H.G., Bui, N.A.

    Published 2022
    “…We evaluated the effectiveness of the proposed algorithm with the Tabu Search algorithm and the original genetic algorithm on the tested dataset. …”
    Get full text
    Get full text
    Article
  8. 8

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Evaluation of fast evolutionary programming, firefly algorithm and mutate-cuckoo search algorithm in single-objective optimization / Muhammad Zakyizzuddin Rosselan, Shahril Irwan S... by Rosselan, Muhammad Zakyizzuddin, Sulaiman, Shahril Irwan, Othman, Norhalida

    Published 2016
    “…In this study proposes an evaluation of different computational intelligences, i.e Fast-Evolutionary Algorithm (FEP), Firefly Algorithm (FA) and Mutate-cuckoo Search Algorithm (MCSA) for solving single-objective optimization problem. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Modeling a problem solving approach through computational thinking for teaching programming / Zebel Al Tareq by Zebel , Al Tareq

    Published 2021
    “…The problem-based and the game-based programming workshops utilizing our problem-solving model using sorting algorithms were the experimental groups. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Swarm inspired test case generation for online C++ programming assessment by Foong, O.-M., Tran, Q.-T., Yong, S.-P., Rais, H.M.

    Published 2014
    “…This paper presents a swarm inspired automatic test case generation for Online Programming Assessment or Judge (UOJ) system. The UOJ is built with the purpose to assist lecturers in evaluating codes submitted from students and generate test cases for every programming problem automatically. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Integrated Optimization Algorithm in Solving Economic Dispatch Problems by Ismail N.L., Musirin I., Dahlan N.Y., Mansor M.H., Sentilkumar A.V.

    Published 2024
    “…The proposed algorithm has been compared with the existing techniques, Multi-objective Barnacles Mating Optimizer and Multi-objective Evolutionary Programming. …”
    Conference Paper
  18. 18
  19. 19

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…The system has the function to judge programming code by evaluating the output that the program produced. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Green inventory routing problem using hybrid genetic algorithm / Huda Zuhrah Ab Halim ... [et al.] by Ab Halim, Huda Zuhrah, Mohd Azliana, Nureffa Natasha, Baharom, Nuridawati, Fauzi, Nur Fatihah, Ahmad Bakhtiar, Nurizatul Syarfinas, Khairudin, Nur Izzati

    Published 2021
    “…The mixed-integer linear programming of this problem is adopted from Cheng et al. wherein this study a different Hybrid Genetic Algorithm is proposed at mutation operator. …”
    Get full text
    Get full text
    Get full text
    Article