Search Results - (( programming using bio algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Modeling of static and dynamic components of bio-nanorobotic systems by Gavgani, Hamidreza Khataee

    Published 2012
    “…In this technique, the graph-based structural models of the fullerenes are proposed using their real structural information. Then, these graph-based structural models of the fullerenes and graph algorithms based on dynamic programming are applied to compute a new set of optimal weighted physical properties of the components including Wiener, hyper-Wiener, Harary and reciprocal Wiener indices as well as Hosoya and hyper-Hosoya polynomials. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    ETOU electricity tariff for manufacturing load shifting strategy using ACO algorithm by Sulaima, Mohamad Fani, Dahlan, Nofri Yenita, Md Isa, Mohamed Hafiz, Othman, Md Nazri, Mat Yasin, Zuhaila, Kasdirin, Hyreil Anuar

    Published 2019
    “…This paper presents load shifting strategy for cost reduction on manufacturing electricity demand side, by which a real test load profile had been used to prove the concept. Superior bio-inspired algorithm, Ant Colony Optimization (ACO) had been implemented to optimize the upright load profile of load shifting strategy in the Malaysia Enhance Time of Use (ETOU) tariff condition. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Effective electricity cost management in a manufacturing operation by using optimal ETOU tariff formulation / M. F. Sulaima, N. Y. Dahlan and Z. M. Yasin by Sulaima, M. F., Dahlan, N. Y., Yasin, Z. M.

    Published 2019
    “…By which, a real test case study of a manufacturing electricity load profile had been used to prove the concept. A superior bio-inspired algorithm, Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) had been implemented and compared in order to optimize the upright load profile of load management strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Estimation of microclimate parameters on infestation rate of yellow stem borer (Scirpophaga incertulas) on MR297 rice variety by Idris, Dauda

    Published 2023
    “…The present study's finding recommends that rice farmers and entomologists develop a pest management program for yellow stem borer and stimulate research workers for sustainable bio-resource management. …”
    Get full text
    Get full text
    Get full text
    Thesis