Search Results - (( parameter estimation bat algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- estimation bat »
- bat algorithm »
- rsa algorithm »
- parameter »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Improving the Muskingum flood routing method using a hybrid of particle swarm optimization and bat algorithm
Published 2023“…Decision making; Disaster prevention; Floods; Routing algorithms; Water resources; Absolute deviations; Bat algorithms; Comparative analysis; Computational time; Flood routing; Muskingum models; Particle swarm optimization algorithm; Swarm algorithms; Particle swarm optimization (PSO); accuracy assessment; algorithm; comparative study; decision making; flood; flood forecasting; flood routing; numerical method; optimization; parameter estimation; water resource; United Kingdom; United States…”
Article -
6
Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm
Published 2018“…The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
Get full text
Get full text
Article -
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
8
A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing
Published 2024“…The firefly algorithm remains a feasible alternative for shallow architectural network models, while metaheuristic algorithms such as the Particle swarm algorithm and Bat algorithm are better options for deeper architectural network models. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
