Search Results - (( programming using bio algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- bio algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
An optimal mesh algorithm for remote protein homology detection
Published 2011Get full text
Get full text
Article -
7
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In this technique, the graph-based structural models of the fullerenes are proposed using their real structural information. Then, these graph-based structural models of the fullerenes and graph algorithms based on dynamic programming are applied to compute a new set of optimal weighted physical properties of the components including Wiener, hyper-Wiener, Harary and reciprocal Wiener indices as well as Hosoya and hyper-Hosoya polynomials. …”
Get full text
Get full text
Thesis -
8
Data mining in network traffic using fuzzy clustering
Published 2003“…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis -
9
Data mining in network traffic using fuzzy clustering
Published 2003“…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis -
10
-
11
ETOU electricity tariff for manufacturing load shifting strategy using ACO algorithm
Published 2019“…This paper presents load shifting strategy for cost reduction on manufacturing electricity demand side, by which a real test load profile had been used to prove the concept. Superior bio-inspired algorithm, Ant Colony Optimization (ACO) had been implemented to optimize the upright load profile of load shifting strategy in the Malaysia Enhance Time of Use (ETOU) tariff condition. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Effective electricity cost management in a manufacturing operation by using optimal ETOU tariff formulation / M. F. Sulaima, N. Y. Dahlan and Z. M. Yasin
Published 2019“…By which, a real test case study of a manufacturing electricity load profile had been used to prove the concept. A superior bio-inspired algorithm, Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) had been implemented and compared in order to optimize the upright load profile of load management strategy. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Estimation of microclimate parameters on infestation rate of yellow stem borer (Scirpophaga incertulas) on MR297 rice variety
Published 2023“…The present study's finding recommends that rice farmers and entomologists develop a pest management program for yellow stem borer and stimulate research workers for sustainable bio-resource management. …”
Get full text
Get full text
Get full text
Thesis
