Search Results - (( (variable OR variables) using optimization algorithm ) OR ( java using encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The programming language that is used to write the program is Java Language.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…This research hopes to give a clear idea to the readers about ABS algorithm. Further research about this topic is recommended to increase the efficiency of ABS algorithm implemented in communication field, so that more different types of field can be encrypted and decrypted instead of plaintext.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel by Hushairi, Zen, Al-Khalid, Hj Othman, Khairuddin, Abdul Hamid, Jamaah, Suut

    Published 2020
    “…In this study, a straightforward Particle Swarm Optimization approach was used to determine the optimal scaling factor to obtain optimized error corrective performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Variable Global Optimization min-sum (VGOMS) algorithm of decodeand-forward protocol for the relay node in the cooperative channel by Hushairi, Zen, Jamaah, Suut, Al-Khalid, Bin Hj Othman, Khairuddin, Bin Ab Hamid

    Published 2019
    “…In this study, a straightforward Particle Swarm Optimization approach was used to determine the optimal scaling factor to obtain optimized error corrective performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models by ul Islam, B., Baharudin, Z.

    Published 2017
    “…These models are developed by integrating multilayer perceptron neural network and evolutionary optimization techniques. Genetic algorithm and simulated annealing techniques are used to optimize the control parameters of the neural network. …”
    Get full text
    Get full text
    Article
  14. 14

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…For this purpose, we implemented four types of variable length meta-heuristic searching algorithms, namely VLBHO-Fitness, VLBHO-Position, variable length particle swarm optimization (VLPSO) and genetic variable length (GAVL), and we compared them in terms of classification metrics. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…For this purpose, we implemented four types of variable length meta-heuristic searching algorithms, namely VLBHO-Fitness, VLBHO-Position, variable length particle swarm optimization (VLPSO) and genetic variable length (GAVL), and we compared them in terms of classification metrics. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Sara, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…For this purpose, we implemented four types of variable length meta-heuristic searching algorithms, namely VLBHO-Fitness, VLBHO-Position, variable length particle swarm optimization (VLPSO) and genetic variable length (GAVL), and we compared them in terms of classification metrics. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Optimization of PID parameters for hydraulic positioning system utilizing variable weight Grey-Taguchi and particle swarm optimization by Nur Iffah, Mohamed Azmi

    Published 2014
    “…Previously, researchers had integrated PSO algorithms in the PID parameter tuning process. This research aims to improve the PSO-PID tuning algorithms by integrating the tuning process with the Variable Weight Grey-Taguchi Design of Experiment (DOE) method. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Optimization of PID Parameters Utilizing Variable Weight Grey-Taguchi Method and Particle Swarm Optimization by Nur Iffah, Mohamed Azmi, Kamal Arifin, Mat Piah, Wan Azhar, Wan Yusoff, F. R. M., Romlay

    Published 2017
    “…Previously, researchers had integrated PSO algorithms in the PID parameter tuning process. This research aims to improve the PSO-PID tuning algorithms by integrating the tuning process with the Variable Weight Grey-Taguchi Design of Experiment (DOE) method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item