Search Results - (( initial evaluation using algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Evaluation of a spacecraft attitude and rate estimation algorithm by Abdullah, Mohammad Nizam Filipski, Varatharajoo, Renuganth

    Published 2010
    “…Practical implications: Because the simulation set‐up is clearly stated, the results of this evaluation can be used as a benchmark for other estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…Additionally, they used either random or non-mathematically proved population initializations methods. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Studying the Impact of Initialization for Population-Based Algorithms with Low-Discrepancy Sequences by Adnan Ashraf, Sobia Pervaiz, Waqas Haider Bangyal, Kashif Nisar, Ag. Asri Ag. Ibrahim, Joel J. P. C. Rodrigues, Danda B. Rawat

    Published 2021
    “…To solve different kinds of optimization challenges, meta-heuristic algorithms have been extensively used. Population initialization plays a prominent role in meta-heuristic algorithms for the problem of optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
    Get full text
    Get full text
    Article
  19. 19

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…The EVFA approach can relocate the sensor nodes using a repulsive and attractive force after initial deployment and CS algorithm is more efficient in exploring the search of maximum coverage area in random deployment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem by Kamal Z., Zamli, Kader, Md. Abdul

    Published 2021
    “…Addressing this issue, this paper evaluates the performance of automated software remodularization using the newly developed Tiki-Taka Algorithm (TTA) and its variants with four chaotic map initializations based on Chebyshev map, Circle map, Logistic Map and Piecewise Map. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item