Search Results - (( program implementation rsa algorithm ) OR ( parameter optimization steam algorithm ))
Search alternatives:
- program implementation »
- parameter optimization »
- implementation rsa »
- optimization steam »
- steam algorithm »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
-
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
5
Combining Genetic Algorithm and Artificial Neural Network to optimize biomass steam power plant emission / Ahmad Razlan Yusoff and Ishak Abdul Aziz
Published 2008“…A parametric study of Genetic Algorithms (GA) parameters such as population size, mutation rates and crossover rates are carried out to get optimal parameters for a GAANN model. …”
Get full text
Get full text
Get full text
Article -
6
Neuro-Fuzzy and Particle Swarm Optimization based Model for the Steam and Cooling sections of a Cogeneration and Cooling Plant
Published 2009“…Neuro-fuzzy approach trained by a sequence of optimization algorithms-Particle Swarm Optimization (PSO) followed by Back-Propagation (BP)-is used to develop models for the steam drum pressure, steam drum water level, steam flow rate and chilled water supply temperature. …”
Get full text
Conference or Workshop Item -
7
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
8
SYSTEMATIC DESIGN ALGORITHM FOR ENERGY EFFICIENT AND COST EFFECTIVE HYDROGEN PRODUCTION FROM PALM WASTE
Published 2012“…In the current study, a systematic autonomous algorithm incorporating reaction kinetics model, flowsheet calculations, heat integration analysis and economic evaluation, has been developed to calculate optimum parameters giving minimum hydrogen production cost using optimization strategies. …”
Get full text
Get full text
Thesis -
9
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
10
-
11
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
12
Improving the environmental impact of palm kernel shell through maximizing its production of hydrogen and syngas using advanced artificial intelligence
Published 2019“…The main target of this research is to improve the production of hydrogen and syngas from palm kernel shell (PKS) steam gasification through defining the optimal operating parametersâ�� using a modern optimization algorithm. …”
Get full text
Get full text
Article -
13
-
14
Temperature control of a pilot plant reactor system using a genetic algorithm model‐based control approach
Published 2007“…The work described in this paper aims at exploring the use of an artificial intelligence technique, i.e. genetic algorithm (GA), for designing an optimal model-based controller to regulate the temperature of a reactor. …”
Get full text
Get full text
Article -
15
Development of optimized maintenance scheduling model for coal-fired power plant boiler
Published 2023“…The optimal schedules obtained were compared with the actual based on parameters and judgement from power plant planning team. …”
text::Thesis
