Search Results - (( construct security optimization algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- security optimization »
- java application »
- construct »
-
1
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…The Least Significant Bits (LSB) technique has been widely used for secure communication. However, it is susceptible to imperceptibility and security risks due to the direct manipulation of pixels, and ASCII patterns present limitations. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
-
5
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…Because the representations of the solutions are similar to the natural formulation, RCGA gets better-customized to the optimization of problems in a continuous domain. Throughout the years, there has been a shift in focus on constructing new crossover and mutation operators to improve the performance of GA in function optimization. …”
Get full text
Get full text
Thesis -
6
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Get full text
Final Year Project -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Secure IIoT-enabled industry 4.0
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Conference or Workshop Item -
10
A neural network modal decomposition mechanism in predicting network traffic
Published 2023“…The proposed mechanism starts by using SABC to update the model with a new solution and fine-tune the disturbances in each iteration to deal with the interference in order to find the best values that are also synchronously optimal. The SAVE-AS then constructs an adaptive selection operator. …”
Get full text
Get full text
Get full text
Thesis -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Data-driven rice yield predictions and prescriptive analytics for sustainable agriculture in Malaysia
Published 2024“…A comprehensive dataset for rice yield prediction in Malaysia was constructed, encompassing yield data from 2014 to 2018. …”
Get full text
Get full text
Get full text
Article -
13
ReSTiNet: An efficient deep learning approach to improve human detection accuracy
Published 2023“…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
Get full text
Get full text
Get full text
Article -
14
A new integrated approach for evaluating sustainable development in the electric vehicle sector
Published 2025“…This study identifies the relative importance of the classification attribute variables based on the classification rules of the target attributes by conducting further analysis with the CART decision model and constructs an optimal prediction model.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
ReSTiNet: An Efficient Deep Learning Approach to Improve Human Detection Accuracy
Published 2023“…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
Get full text
Get full text
Article -
16
ReSTiNet : An efficient deep learning approach to improve human detection accuracy
Published 2023“…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
Get full text
Get full text
Get full text
Article -
17
