Search Results - (( based coding optimization algorithm ) OR ( java model encryption algorithm ))
Search alternatives:
- coding optimization »
- model encryption »
- based coding »
- java model »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
3
Provider independent cryptographic tools
Published 2003“…The library consists of cryptographic algorithms that include symmetric and asymmetric encryptions, key exchange, hashing algorithms and digital signature algorithms. …”
Get full text
Get full text
Get full text
Monograph -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
8
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
9
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…By using the optimization min-sum belief propagation approach, a low complexity min-sum (MS) based decoding algorithm called Variable Global Optimization Min-Sum (VGOMS) has been developed. …”
Get full text
Get full text
Get full text
Thesis -
10
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
11
-
12
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System
Published 2021“…In this paper, a new optimized generation of CNC systems, based on combining the Open Architecture Control (OAC) technology supported by the G-code data model and the optimization algorithm are presented…”
Get full text
Get full text
Get full text
Get full text
Article -
14
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
15
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…This work focuses on the optimization of the parallelization of a sequential code. …”
Get full text
Get full text
Research Report -
16
A review of crossover methods and problem representation of genetic algorithm in recent engineering applications
Published 2020“…Genetic algorithm (GA) is a popular technique of optimization that is bio-inspired and based on Charles Darwin's proposed principles of natural genetics and natural selection theories. …”
Get full text
Get full text
Get full text
Article -
17
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
18
-
19
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
Get full text
Get full text
Thesis -
20
