Search Results - (( java implementation rsa algorithm ) OR ( var optimization model algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- optimization model »
- var optimization »
- model algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Determining optimal location of static VAR compensator by means of genetic algorithm
Published 2011“…The purpose of this paper is to study a practical and accurate heuristic method known as genetic algorithm (GA) which is used to find the optimal location of Static Var Compensator (SVC) and its appropriate size and setting. …”
Get full text
Get full text
Conference or Workshop Item -
6
Sensitivity-based fuzzy multi-objective portfolio model with Value-at-Risk
Published 2019“…In addition, compared with the VaR-FMOPSM model, our sensitivity-based improved model with the IPSO algorithm also performs better than Genetic Algorithm and Simulate Anneal Algorithm (SA), it provides the same performance on this point. …”
Get full text
Get full text
Article -
7
A variable-capacity-based fuzzy random facility location problem with VaR objective
Published 2010Get full text
Book chapter -
8
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
9
Optimization of support vector machine parameters in modeling of Iju deposit mineralization and alteration zones using particle swarm optimization algorithm and grid search method
Published 2023“…Copper deposits; Deposits; Geology; Learning algorithms; Mineralogy; Static Var compensators; Support vector machines; Three dimensional computer graphics; Alteration zones; Grid search; Grid-search method; Mineralization zone; Model Selection; Particle swarm optimization algorithm; Penalty parameters; Performance; Support vector classifiers; Support vectors machine; Particle swarm optimization (PSO); accuracy assessment; algorithm; classification; computer simulation; copper; geological survey; mineral alteration; mineralization; numerical model; ore deposit; parameterization; performance assessment; porphyry; resource assessment; support vector machine; three-dimensional modeling; Iran…”
Article -
10
Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach
Published 2025“…Employing both single- and multi-objective optimization algorithms, the research addresses the OPF problem in a modified IEEE-30 bus system through various case studies. …”
Article -
11
Evaluating Adan vs. Adam: an analysis of optimizer performance in deep learning
Published 2025“…With various optimization algorithms available, choosing the one that best suits the deep learning model and dataset can make a substantial difference in achieving optimal results. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…The genetic algorithm technique is explained and the real number representation of genetic algorithm is modeled. …”
Get full text
Get full text
Thesis -
13
Loss minimization with SVC installation using the Firefly Algorithm method / Syazana Abdul Halim
Published 2012“…This algorithm method is idealized by some of the characteristics of fireflies. …”
Get full text
Get full text
Thesis -
14
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…The study was divided into 3 phases, involving the implementation of CISOS to determine the optimal allocation of Static VAr Compensator (SVC), optimal allocation of Thyristor Controlled Series Compensator (TCSC), as well as simultaneous optimal allocation of SVC and TCSC in a power system. …”
Get full text
Get full text
Thesis -
15
Computational intelligence based technique for congestion management and compensation scheme in power system / Nur Zahirah Mohd Ali
Published 2019“…CEPSO integrates the element of cloning and swarm in the original Evolutionary Programming algorithm. CEPSO is initially used to optimize the location and sizing of FACTS devices for compensation scheme. …”
Get full text
Get full text
Thesis
