Search Results - (( software optimization techniques algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7
  8. 8

    Software defect prediction framework based on hybrid metaheuristic optimization methods by Wahono, Romi Satria

    Published 2015
    “…The proposed framework and models that are are considered to be the specific research contributions of this thesis are: 1) a comparison framework of classification models for software defect prediction known as CF-SDP, 2) a hybrid genetic algorithm based feature selection and bagging technique for software defect prediction known as GAFS+B, 3) a hybrid particle swarm optimization based feature selection and bagging technique for software defect prediction known as PSOFS+B, and 4) a hybrid genetic algorithm based neural network parameter optimization and bagging technique for software defect prediction, known as NN-GAPO+B. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Towards Wind Energy-based Charging Stations: A Review of Optimization Methods by Alhasan A.M.W., Umar D.A., Alkawsi G., Alkahtani A.A., Alomari M.A., Aris H.

    Published 2024
    “…The aim is to discern the most efficacious techniques for optimizing charging stations. Researchers engage diverse strategies and methodologies in the realm of sizing and optimization, encompassing a spectrum of algorithmic implementations and software solutions. …”
    Article
  10. 10

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…We often see many of the method of Genetic Algorithm (GA), Ant Colony Optimization (ACO), Simulated Annealing Algorithm (SAA) and PSO are used for any optimization problems. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    An optimized test case generation technique for enhancing state-sensitivity partitioning by Sultan, Ammar Mohammed Dawood

    Published 2017
    “…The essence of enSSP is to combine the features of Genetic Algorithm (GA) with a suite reduction technique to achieve optimization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    OPTIMAL DESIGN OF A BLDC MOTOR BY GENETIC ALGORITHM by OTHMAN, AZRUL HISHAM

    Published 2007
    “…The optimal design parameters of the motor obtained by GA are compared with those obtained by SA technique. …”
    Get full text
    Get full text
    Final Year Project