Search Results - (( data classification scheduling algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- classification scheduling »
- data classification »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks
Published 2011“…In terms of the complexity property, genetic algorithm has an advantage in holding the fitness score of the queue in separate storage space which potentially minimises the complexity of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Fault detection of aircraft engine components using fuzzy unordered rule induction algorithm
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…The malware has potential to compromise and steal the private data, classified data, instant messages, private business contacts, and confidential schedule. …”
Get full text
Get full text
Get full text
Article -
12
AI chatbot system for educational institutions
Published 2023“…This project presents the design and development of an advanced chatbot system powered by deep learning algorithms for intent classification. The chatbot's primary goal is to facilitate effective communication and support for users, particularly students inquiring about admission processes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
A comprehensive review of optimization techniques in industrial applications: Trends, classifications, and future directions
Published 2025“…The research contribution of this review is to provide a structured classification of optimization methods—namely exact algorithms, heuristics, metaheuristics, and AI-integrated hybrid models—and to critically evaluate their practical applications, limitations, and emerging trends across industries. …”
Get full text
Get full text
Get full text
Article -
15
Logistics center location-inventory-routing problem optimization: a systematic review using PRISMA method
Published 2022“…A total of 112 LIRP-related studies published between 2010 and 2021 are reviewed and classified based on 10 abstract and citation databases. The classification includes four aspects: problem characteristics, demand data types, model-based solutions, and application fields. …”
Get full text
Get full text
Article
