Search Results - (( java implementation rsa algorithm ) OR ( web optimization model algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- optimization model »
- web optimization »
- model algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
8
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024Proceedings Paper -
9
Predicting next page access by Markov models and association rules on web log data
Published 2006“…This algorithm has been used to cluster Web site with similar transition behaviors and compares the transition matrix to an optimal size for efficient used to further improve the efficiency of prediction. …”
Get full text
Get full text
Get full text
Article -
10
Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. …”
Get full text
Get full text
Get full text
Article -
11
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…Secondly, this work designs optimization measures from inertia weight and learning factor to build an improved particle swarm optimization algorithm (IPSO). …”
Get full text
Get full text
Article -
12
Student-Class (SC) optimization system / Haifaa Mahfuzah Hazalin
Published 2020“…To solve the issue the Student-Class Optimization System had been developed by using optimization technique, specifically, is a Greedy Algorithm. …”
Get full text
Get full text
Thesis -
13
Optimal Long-Term Hydro Generation Scheduling of Small Hydropower Plant (SHP) using Metaheuristic Algorithm in Himreen Lake Dam
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Optimizing the production of valuable metabolites using a hybrid of constraint-based model and machine learning algorithms : A review
Published 2023“…This review paper summarizes research on the hybrid of constraint-based models and machine learning algorithms in optimizing valuable metabolites. …”
Get full text
Get full text
Get full text
Article -
15
Development of Web services fuzzy quality models using data clustering approach
Published 2014“…For future work, the fuzzy quality models will be employed in web services' QoS monitoring application. …”
Get full text
Get full text
Article -
16
-
17
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Experimental evaluation confirmed that the proposed grid scheduling algorithms possess a high degree of optimality in performance, efficiency and scalability.…”
Get full text
Get full text
Thesis
