Search Results - (( java implementation rsa algorithm ) OR ( programming validity application algorithm ))
Search alternatives:
- application algorithm »
- programming validity »
- validity application »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad
Published 2024“…This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
Get full text
Get full text
Thesis -
10
An Integer Linear Programming model and Adaptive Genetic Algorithm approach to minimize energy consumption of Cloud computing data centers
Published 2018“…This paper focuses on the development of a dynamic task scheduling algorithm by proposing an Integer Linear Programming (ILP) model that minimizes the energy consumption in a Cloud data center. …”
Get full text
Get full text
Article -
11
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…The first proposed approach is a multi-objective fuzzy linear programming optimization (MFLP) algorithm to solve the MOOPF problem. …”
Get full text
Get full text
Thesis -
12
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…When compared to the Supply Chain Guru X (SCGX) software, the proposed algorithms offer higher practical applicability.…”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…In recent years, extensive works on genetic algorithms have been reported covering various applications. …”
Get full text
Get full text
Get full text
Article -
15
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…In recent years, extensive works on genetic algorithms have been reported covering various applications. …”
Get full text
Get full text
Article -
16
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…In recent years, extensive works on genetic algorithms have been reported covering various applications. …”
Get full text
Get full text
Article -
17
Structural Equation Modeling Algorithm and Its Application in Business Analytics
Published 2017“…This review article algorithmically discussesthe SEM methodology. SEM strategies, SEM steps and SEM stages are introduced in this article; validity tests are presented os well. …”
Get full text
Get full text
Get full text
Book Chapter -
18
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
19
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
20
An Analytical Algorithm for Delphi Method for Consensus Building and Organizational Productivity
Published 2017“…This review article algorithmically discussesthe SEM methodology. SEM strategies, SEM steps and SEM stages are introduced in this article; validity tests are presented os well. …”
Get full text
Get full text
Get full text
Book Chapter
