Search Results - (( java implementation rsa algorithm ) OR ( using (evolutionary OR evolution) system algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Global optimal analysis of variant genetic operations in solar tracking by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Lots of research has been carried out in solar tracking system using different types of Evolutionary Algorithm. …”
    Article
  12. 12
  13. 13

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Comparative study of optimal power flow using evolutionary programming and immune evolutionary programming technique in power system / Mohd Khairil Izwan Md Daim by Md Daim, Mohd Khairil Izwan

    Published 2006
    “…Optimal power flow (OPF) is one of the main functions of power system operation and control. This project presents a new technique for solving the optimal power flow problem, in a power system using an Evolutionary Programming and Immune Evolution Programming optimization technique. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Two level Differential Evolution algorithms for ARMA parameters estimatio by Salami, Momoh Jimoh Emiyoka, Tijani, Ismaila, Aibinu, Abiodun Musa

    Published 2013
    “…The performance of the algorithm is evaluated using both simulated ARMA models and practical rotary motion system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Nature-Inspired cognitive evolution to play Ms. Pac-Man by Tse, Guan Tan, Jason Teo, Patricia Anthony

    Published 2011
    “…Some approaches have reported that it is able to solve dynamic problems and very useful for improving the performance of various complex systems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Design of digital circuit structure based on evolutionary algorithm method by Chong, Kok Hen, Aris, Ishak, Bashi, Senan Mahmood, Koh, Johnny Siaw Paw

    Published 2008
    “…Evolutionary Algorithms (EAs) cover all the applications involving the use of Evolutionary Computation in electronic system design. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Software testing optimization for large systems using agent-based and NSGA-II algorithms by Jamil, Muhammad Abid, Nour, Mohamed Kidher, Awang Abu Bakar, Normi Sham

    Published 2023
    “…The performance of a multi-objective Non-Dominated Sorting Genetic Algorithm II (NSGA-II) and evolutionary multi-agent system (EMAS) on Feature Models (FMs) to enhance large System testing is reported in this study.…”
    Get full text
    Get full text
    Get full text
    Article