Search Results - (( using practical use algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- using practical »
- application rsa »
- practical use »
- use algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…The experimental tests of the proposed algorithm have shown that the reduction percentage in the MSE output using the proposed algorithm is 51% compared to the NLMS algorithm and 61% compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
7
-
8
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…Online algorithms are used in a variety of situations such as forex trading, cache replacement, and job scheduling etc. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
A practical method for the analysis of genetic algorithms
Published 2011“…The experimental result done on some of the known genetic algorithms show the usefulness of the proposed method in improving the quality of genetic algorithms.…”
Get full text
Get full text
Get full text
Article -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
Pre-emptive resource-constrained multimode project scheduling using genetic algorithm: a dynamic forward approach
Published 2016“…Then algorithm is then applied for scheduling a hospital in practice. …”
Get full text
Get full text
Get full text
Article -
12
Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems
Published 2011“…Furthermore, the accuracy of the state estimate with the smallest state error covariance is enhanced by using the Kalman filtering theory. This enhancement produces the filtering solution by using the second sub-algorithm. …”
Get full text
Get full text
Thesis -
13
Whole brain radiation therapy verification using 2D gamma analysis method
Published 2020“…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
Get full text
Get full text
Thesis -
14
Classgrid: timetabling system using genetic algorithm
Published 2024Get full text
final_year_project -
15
Student-supervisor matching using stable marriage algorithm / Siti Farahana Nodzari
Published 2007“…Therefore, the main objective of this project is to develop a system that is able to match student to the supervisor using Stable Marriage Algorithm. Students who do not know lecturers area and which lecturer is suitable for their project can use this system in order to find lecturer's in the same area using this matching system. …”
Get full text
Get full text
Thesis -
16
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…Consequently, the practical applicability of the NLFXLMS algorithm is limited by this drawback. …”
Get full text
Get full text
Thesis -
17
AntNet: a robust routing algorithm for data networks
Published 2004“…Successful implementation and operation of a network largely depends on the routing algorithm in use. To date, several routing algorithms are in use but the problem with these algorithms is that they are either not adaptive or not robust enough, thus limiting the proper use of bandwidth. …”
Get full text
Get full text
Get full text
Article -
18
Optimization of drilling path using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Article -
19
Modelling and Optimization of Asymmetric Vehicle Routing Problem Using Particle Swarm Optimization Algorithm
Published 2021“…The computational experiment was conducted using five test problems with different sizes. The optimization results indicated that this algorithm able to offer good solutions with the best answer for the practical problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
CSC669 - Cryptographic Algorithms / College of Computing, Informatics and Media
Published 2021“…The subject delivery combines both theoretical and practical aspects of cryptography algorithms…”
Get full text
Get full text
Get full text
Teaching Resource
