Search Results - (( policy evolution optimization algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation by Turgut, Mert Sinan, Turgut, Oguz Emrah, Afan, Haitham Abdulmohsin, El-Shafie, Ahmed

    Published 2019
    “…First, three different optimization algorithms, namely particle swarm optimization, differential evolution, and whale optimization algorithm, have been applied. …”
    Get full text
    Get full text
    Article
  7. 7

    Developing a hybrid model for accurate short-term water demand prediction under extreme weather conditions: a case study in Melbourne, Australia by Zubaidi S.L., Kumar P., Al-Bugharbee H., Ahmed A.N., Ridha H.M., Mo K.H., El-Shafie A.

    Published 2024
    “…Hybrid model development included the optimization of ANN coefficients (its weights and biases) using adaptive guided differential evolution algorithm. …”
    Article
  8. 8

    Proposed algorithm for scheduling in computational grid using backfilling and optimization techniques by Dakkak, Omar, Awang Nor, Shahrudin, Che Mohamed Arif, Ahmad Suki

    Published 2016
    “…To allocate the suitable resources for the incoming jobs, a scheduling algorithm has to manage this process.In this paper, we provide a critical review the recent mechanisms in “grid computing” environment.In addition, we propose a new scheduling algorithm to minimize the delay for the end user, Gap Filling policy will be applied to improve the performance of the priority algorithm.Then, an optimization algorithm will perform in order to further enhance the initial result for that obtained from backfilling mechanism.The main aim of the proposed scheduling mechanism is to improve the QoS for the end user in a real grid computing environment.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    The duality of technological innovation and dynamic capabilities: the micro-foundation of China's construction machinery industry's rise up the global value chain by Xia, Weifu, Alwie, Aryaty, Taasim, Shairil Izwan, Jin, Wong Tze, Naning, Fatin Hana

    Published 2024
    “…At the practical level, the research results provide guidance for engineering machinery companies to formulate innovation strategies and enhance global competitiveness, and also provide a basis for the government to formulate industrial upgrading policies. Future research can further explore the long-term evolution path of technological innovation duality and its differences in cross-cultural contexts.…”
    Get full text
    Get full text
    Get full text
    Article