Search Results - (( based evaluation bat algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The aim of the research is to introduce novel form of swarm intelligence algorithms based on real echolocation behaviour of bats. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm by Mohd Annuar, Khalil Azha, Selamat, Nur Asmiza, Jaafar, Hazriq Izzuan, Mohamad, Syahrul Hisham

    Published 2013
    “…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Opposition-Based Quantum Bat Algorithm to Eliminate Lower-Order Harmonics of Multilevel Inverters by Islam, J., Meraj, S.T., Masaoud, A., Mahmud, M.A., Nazir, A., Kabir, M.A., Hossain, M.M., Mumtaz, F.

    Published 2021
    “…This study proposes an opposition-based quantum bat algorithm (OQBA) to determine these optimum switching angles. …”
    Get full text
    Get full text
    Article
  11. 11

    Opposition-Based Quantum Bat Algorithm to Eliminate Lower-Order Harmonics of Multilevel Inverters by Islam, J., Meraj, S.T., Masaoud, A., Mahmud, M.A., Nazir, A., Kabir, M.A., Hossain, M.M., Mumtaz, F.

    Published 2021
    “…This study proposes an opposition-based quantum bat algorithm (OQBA) to determine these optimum switching angles. …”
    Get full text
    Get full text
    Article
  12. 12

    The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction by Marlan Z.M., Ramlie F., Jamaludin K.R., Harudin N.

    Published 2023
    “…This, however, leads to sub-optimality of prediction accuracy as the orthogonal array design lacks in offering higher-order variable interactions, in addition to its fixed and limited variable combinations to be assessed and evaluated. This paper proposes an optimization algorithm based on the Binary Bat algorithm methodology for replacing the conventional orthogonal array approach. …”
    Article
  13. 13

    Taguchi's T-method with nearest integer-based binary bat algorithm for prediction by Marlan Z.M., Jamaludin K.R., Ramlie F., Harudin N.

    Published 2023
    “…In this paper, a swarm-based binary bat optimization algorithm with a nearest integer discretization approach is integrated with the Taguchi�s T-method. …”
    Article
  14. 14
  15. 15
  16. 16

    Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm by Farzin, Saeed, Singh, Vijay, Karami, Hojat, Farahani, Nazanin, Ehteram, Mohammad, Kisi, Ozgur, Allawi, Mohammed Falah, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2018
    “…Seven performance indexes were examined to evaluate the performance of the proposed Muskingum model integrated with IBA, with other models that were also based on the Muskingum Model with three-parameters but utilized different optimization algorithms. …”
    Get full text
    Get full text
    Article
  17. 17

    Review of Multi-Objective Swarm Intelligence Optimization Algorithms by Yasear, Shaymah Akram, Ku Mahamud, Ku Ruhana

    Published 2021
    “…The review is based on how the algorithms deal with objective functions using MOO approaches, the benchmark MOPs used in the evaluation and performance metrics. …”
    Get full text
    Get full text
    Article
  18. 18

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…This paper proposes a new hybrid of nature inspired optimization algorithm (IFDO-WOABAT) based on the latest optimization algorithm namely Improved Fitness Dependent Optimization (IFDO) with Whale-Bat Optimization algorithm (WOABAT). …”
    Get full text
    Get full text
    Get full text
    Proceeding
  19. 19

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…The IDBA-AFW evaluates the fitness of relay nodes based on multiple criteria, such as energy efficiency, throughput, and end-to-end delay. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20