Search Results - (( simulation optimization rfid algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- optimization rfid »
- rfid algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. …”
Get full text
Get full text
Get full text
Thesis -
6
Hybridized firefly algorithm for multi-objective radio frequency identification (RFID) network planning
Published 2017“…The RFID network planning (RNP) problem belongs to the large-scale multi-objective hard optimization problems. …”
Get full text
Get full text
Article -
7
Optimization of RFID network planning using MDB-FA method
Published 2017“…The generated data are utilized as an input representation to apply into firefly algorithm based on Density-Based Algorithm (DBSCAN) to find the optimal network solution. …”
Get full text
Get full text
Article -
8
An efficient unknown detection approach for RFID data stream management system
Published 2025“…This study highlights the potential for significant improvements in RFID system efficiency and paves the way for future research in optimizing RFID tag detection methodologies. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
An innovative approach for estimating the number of tags in RFID traffic monitoring systems
Published 2024“…This paper presents a new approach to estimate the number of tags within the reader's range in an RFID traffic monitoring system, with the goal of improving the dynamic framed slotted ALOHA anti-collision algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Effect of parameters variation on the performance of particle swarm optimization algorithm for tag coverage problem of radio frequency identification network
Published 2016“…In this paper, PSO (Particle Swarm Optimization) algorithm is used to optimize the tag coverage problem. …”
Get full text
Get full text
Article -
13
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis
