Search Results - (( java implementation rsa algorithm ) OR ( using (evolutionary OR evolution) max algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Performance comparison of differential evolution and particle swarm optimization in constrained optimization by Iwan, Mahmud, Akmeliawati, Rini, Faisal, Tarig, Al-Assadi, Hayder M.A.A.

    Published 2012
    “…Particle swarm optimization (PSO) and differential evolution (DE) are among the well-known modern optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…These algorithms can improve mobile stations’ quality of service as well as guarantee seamless mobility across the Long-Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) technologies. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced handover decision algorithm in heterogeneous wireless network by Abdullah, Radhwan Mohammed, Ahmad Zukarnain, Zuriati

    Published 2017
    “…The algorithm consists of three technology interfaces: Long-Term Evolution (LTE), Worldwide interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Social spider optimisation algorithm for dimension reduction of electroencephalogram signals in human emotion recognition by Al-Qammaz, Abdullah Yousef, Ahmad, Farzana Kabir, Yusof, Yuhanis

    Published 2018
    “…Due to some limitations of current heuristics and evolutionary algorithms, this paper proposed a new swarm based algorithm for feature selection method called Social Spider Optimization (SSO-FS). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Improved handover decision algorithm using multiple criteria by Mohamed Abdullah, Radhwan, Abualkishik, Abedallah Zaid, Alwan, Ali Amer

    Published 2018
    “…Additionally, three technology interfaces were embedded in this study including Worldwide interoperability for Microwave Access (WiMAX), Wireless Local Area Network (WLAN), and Long-Term Evolution (LTE). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Maximum-largest weighted delay first algorithm for heterogeneous traffic in 4G networks by Elsheikh, Elsheikh Mohamed Ahmed, Habaebi, Mohamed Hadi, Mohd Ramli, Huda Adibah, Arafa, Mohammed H. A., Ahmed, Kazi Istiaque

    Published 2018
    “…Packet Loss Ratio (PLR), and Mean User Throughput performance measures were used to validate the performance of M-LWDF algorithm against other algorithms using similar mobile environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Power amplifier memory polynomial predistorter for long term evolution application by Mazidi, Hossein

    Published 2015
    “…These nonlinear modeling techniques can be applied to the design of successful predistortion algorithms. The overall structure of a linearized transmitter using Memory Polynomial Digital Predistortion (MP DPD) architecture is represented to obtain both linearity and efficiency of the nonlinear PAs. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Stress analysis and fatigue life prediction of a wobble-plate by Osman Ali, Hassan

    Published 2006
    “…The fatigue life prediction is performed using Brown-Miller algorithm with Morrow mean stress correction method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Performance comparison of GA and PSO based ANN training on medical dataset / Muhammad Amirul Danish Jamal by Jamal, Muhammad Amirul Danish

    Published 2025
    “…Data preprocessing was carried out using min-max normalization, and an ANN architecture featuring 20 hidden neurons was created and optimized with MATLAB. …”
    Get full text
    Get full text
    Thesis