Search Results - (( parallel distributed search algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- distributed search »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023Subjects:Conference paper -
6
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…The first step lies at the modelling of parallel applications running on heterogeneous parallel computers. …”
Get full text
Get full text
Thesis -
7
Solving multi-objective dynamic vehicle routing problem with time windows using multi-objective algorithm
Published 2022“…Our algorithm uses non-fitness evolutionary distributed parallelized adaptive large neighbourhood search (NEDPALNS). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…The fruit flies or Drosophila Melanogaster movement strategy offers some advantages such as strategic 'search-aggregation' cycle, distribution of moving patterns with Levy Random, information sharing in real-time, and reduction of controller parameters during movements. …”
Get full text
Get full text
Thesis -
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
CSC742 - Storage and Retrieval Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
11
CSC742: Storage and Retrieval Algorithms / College of Computing, Informatics and Mathematics
Published 2018Get full text
Get full text
Get full text
Teaching Resource -
12
-
13
P2P-Based Image Recognition for Component Tracking in a Large Engineering Domain
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The reason for using variable length searching is its effectiveness in searching for high dimensional space and reducing the number of candidates' features. …”
Get full text
Get full text
Thesis -
15
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…The PSO inverse technique is then applied to the magnetization curve to construct the magnetic moment distribution. A multimodal normalized log-normal distribution was used in the minimization of the objective function of the PSO inversion technique, and a modification of the PSO search region is proposed to improve the exploration and exploitation of the PSO particles. …”
Get full text
Get full text
Get full text
Article
