Search Results - (( java application rsa algorithm ) OR ( based evaluation study algorithm ))
Search alternatives:
- java application »
- based evaluation »
- evaluation study »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…In addition, the weight of importance is critical for evaluating the performance of MaOO algorithms. All evaluation studies for MaOO algorithms have ignored to assign such weight for the target criteria during evaluation process. …”
Get full text
Get full text
Thesis -
7
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…The preliminary results show that remarkable studies were reported without considering performance metrics for the purpose of algorithm evaluation. …”
Get full text
Get full text
Article -
8
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
9
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
Get full text
Get full text
Get full text
Thesis -
10
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…Therefore, for a new document, evaluation of algorithms is ineluctable. The study also proposed a simple but reliable cluster evaluation metric called NPL-C metric. …”
Get full text
Get full text
Get full text
Thesis -
12
Evaluation of Vector Evaluated Particle Swarm Optimisation Enhanced with Non-dominated Solutions and Multiple Nondominated Leaders based on WFG Test Functions
Published 2014“…In this study, a more complex benchmark datasets called WFG, is considered for the evaluation of VEPSO, VEPSOnds, and VEPSOml algorithms.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
14
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
Get full text
Get full text
Thesis -
15
Educational video recommender system for computer science students using content-based filtering / Walid Burhani Mohd Zamani
Published 2025“…The problem is the student finds it hard to find suitable educational videos that suit their interest, and students get time consuming when searching for educational videos. The objective is to study the content-based algorithm, to develop the prototype of educational video recommendation system using content-based filtering algorithm and to evaluate the performance and accuracy of the content-based filtering algorithm. …”
Get full text
Get full text
Thesis -
16
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. …”
Get full text
Get full text
Get full text
Article -
17
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…Several non-metric-based algorithms are available in the literature, the most robust and reliable one is the dynamic programming-based technique. …”
Get full text
Get full text
Article -
18
Hybrid performance measures and mixed evaluation method for data classification problems
Published 2012“…Second, this study evaluates the current evaluation practices for evaluating and comparing the two performance measures. …”
Get full text
Get full text
Thesis -
19
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
Get full text
Get full text
Article -
20
An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation
Published 2016“…Such an approach leads to a weak reliability and shape matching of the produced segments. Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
Get full text
Get full text
Get full text
Thesis
