Search Results - (( java application rsa algorithm ) OR ( variable attractions selection algorithm ))
Search alternatives:
- variable attractions »
- selection algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…A modeling approach is developed which focuses on the phases in the model-building procedures, effects of interactions variables on the model, minimizing the effects of multicollinearity on the variables and recommending remedial techniques to overcome them, identification of the significant variables by removing insignificant variables, selecting the best model using the eight selection criteria (8SCs), and finally using the residual analysis to validate the chosen best model. …”
Get full text
Get full text
Get full text
Thesis -
7
A Fast Scheduling Algorithm for WDM Optical Networks
Published 2000“…Two variations of implementation of the scheduling algorithm have been proposed, namely the Variable Frame Size (VFS) and Limited Frame Size (LFS) schemes. …”
Get full text
Get full text
Thesis -
8
Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm
Published 2023“…Utilising the selected features, the Random Forest model is then trained to produce a robust prediction model. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Technical efficiency performance of Malaysian public research universities: Fuzzy data envelopment analysis / Saber Abdelall Mohamed Ahmed
Published 2023“…Based on past research supported by scholars in higher education studies, this study three input variables selected are the number of full-time-equivalent (FTE) staff, number of full-time-equivalent students and ratio of FTE international students to FTE students. …”
Get full text
Get full text
Get full text
Thesis -
10
Optimization and control of hydro generation scheduling using hybrid firefly algorithm and particle swarm optimization techniques
Published 2018“…In the FPSO method, the local search is performed through the modified light intensity attraction step with PSO operator. Secondly, this approach hybridizing the FA with the rough algorithm (RA), where RA is used to control the steps of randomness for the FA while optimizing the weights of the standard BPNN model. …”
Get full text
Get full text
Thesis -
11
Development of sorting system for oil palm in vitro shoots using machine vision approach
Published 2014“…The result of K-means has proven the robustness of the selected features. The resulting error of offline tests of the sorting algorithm did not exceed 4.33 per cent. …”
Get full text
Get full text
Thesis -
12
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…Besides, this framework offers high performance even with the challenging and high mobility scenarios related to the variability of mobility behaviour. The developed CEC-GP also includes an integrated approach that combined all clustering tasks such as cluster formation, cluster head selection, and cluster maintenance. …”
Get full text
Get full text
Get full text
Thesis -
13
Power prediction using the wind turbine power curve and data-driven approaches / Ehsan Taslimi Renani
Published 2018“…Wind energy as one of the promising energy sources, has attracted great attention because it is pollution-free and abundant. …”
Get full text
Get full text
Get full text
Thesis
