Search Results - (( based encryption method algorithm ) OR ( sequence optimization bees algorithm ))

Refine Results
  1. 1

    Assembly sequence optimization using the bees algorithm by Kamaruddin, Shafie, Azmi, Nabilah, Sukindar, Nor Aiman

    Published 2022
    “…In this study, the assembly sequence of a product was optimized by applying an algorithm known as the Bees Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Application of the Bees Algorithm to find optimal drill path sequence by Zainal Abidin, Muhammad Harith, Kamaruddin, Shafie, Adam Malek, Afiqah, Sukindar, Nor Aiman

    Published 2024
    “…These results show that the Bees Algorithm can be an alternative approach to find the optimal drilling sequence.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Optimization of drilling path using the bees algorithm by Kamaruddin, Shafie, Rosdi, Mohamad Naqiuddin, Sukindar, Nor Aiman

    Published 2021
    “…The results comparison shows that the Bees Algorithm achieved comparable performance compared to other algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Evaluating Bees Algorithm for Sequence-based T-way Testing Test Data Generation by M. H., Mohamed Zabil, Kamal Z., Zamli, K. C., Lim

    Published 2018
    “…However, very few strategies have been proposed for sequence-based t-way. This paper presents statistical analysis on the performance of Bees Algorithm against the other sequence t-way strategies, in order to generate test cases.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP by Bibi Aamirah Shafaa Emambocus, Muhammed Basheer Jasser, Muzaffar Hamzah, Aida Mustapha, Angela Amphawan

    Published 2021
    “…Since there is no known polynomial-time algorithm for solving large scale TSP, metaheuristic algorithms such as Ant Colony Optimization (ACO), Bee Colony Optimization (BCO), and Particle Swarm Optimization (PSO) have been widely used to solve TSP problems through their high quality solutions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
    Get full text
    Get full text
    Thesis
  11. 11

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  12. 12

    Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm by Al-Qattan, Zakaria Noor Aldeen Mahmood

    Published 2010
    “…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys by Khalaf, Emad Taha, Mohammed, Muamer N., Kohbalan, Moorthy, Hasan, Raed Abdulkareem

    Published 2018
    “…Thus, to protect the biometric templates it must be encrypted before storing in database. In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Research on the security algorithm of reversible information hiding in communication encrypted image by Jijun, Wang, Soo, Fun Tan, Yi, Yuan

    Published 2021
    “…Considering the embedding capacity and the security of the algorithm, the paper proposes a reversible information hiding algorithm for encrypted images based on. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings