Search Results - (( code adaptation optimization algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An adaptive flower pollination algorithm for minimizing software testing redundancy by M. N., Kabir, Ali, Jahan, Alsewari, Abdulrahman A., Kamal Z., Zamli

    Published 2017
    “…In this paper, we present an adaptive flower pollination algorithm for solving an optimization problem, i.e., minimization of software testing redundancy. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Stack-run adaptive wavelet image compression using wavelet packets by Awan, A. Majid, Rajpoot, Nasir M., Hussain, Syed Afaq, Md. Sap, Mohd. Noor

    Published 2007
    “…Due to the fact that our coder exploits the redundancies present within individual sub bands, its addressing complexity is much lower than that of the wavelet zerotree coding algorithms. Experimental results show coding gains of up to 1.4 dB over the benchmark wavelet coding algorithm.…”
    Get full text
    Article
  7. 7

    ADAPTIVE MODULATION AND CODING FOR WIMAX SYSTEMS by MAJAVU, WABO

    Published 2006
    “…This project is on design and implementation of adaptive modulation in Wimax systems for broadband wireless networks. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems by Salman, Mustafa Ismael

    Published 2015
    “…To achieve this objective, an iterative approach based on swarm intelligence is used to find the optimal CQI threshold at which the competing criteria are optimized. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-population kidney-inspired algorithm with migration policy selections for feature selection problems by Najmeh Sadat Jaddi, Salwani Abdullah, Say leng goh, Mohd Zakree Ahmad Nazri, Zalinda Othman, Mohammad Kamrul Hasan, Fatemeh Alvankarian

    Published 2025
    “…Conversely, the second algorithm, coded as AutoMultiPop-KA, adopts an adaptive migration policy selection process that determines migration type based on the average fitness of subpopulations. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Optimizing lossless compression by normalized data length in Huffman Algorithm by Tonny, Hidayat

    Published 2022
    “…The proposed new algorithm has more optimal CR than the various variants of the Huffman-based lossless application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Recent advances of whale optimization algorithm, its versions and applications by Alyasseri Z.A.A., Ali N.S., Al-Betar M.A., Makhadmeh S.N., Jamil N., Awadallah M.A., Braik M., Mirjalili S.

    Published 2024
    “…One of the SI algorithms is called the whale optimization algorithm (WOA). …”
    Book chapter
  15. 15

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…Surrounded by an assortment of intelligent, adaptive and efficient search entities, the Low-Level Hybridization(LLH) for Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), are proven to be a comprehensive tool for solving different kinds of optimization problems due to their contradictive behaviour. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20