Search Results - (( develop year encryption algorithm ) OR ( java data optimization algorithm ))
Search alternatives:
- data optimization »
- develop year »
- java »
-
1
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
4
-
5
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
Get full text
Get full text
Thesis -
6
Cryptanalysis and design of chaos based image encryption schemes
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
8
An overview of video encryption techniques
Published 2010“…Therefore, security and privacy has become an important. Over the last few years several encryption algorithms have applied to secure video transmission. …”
Get full text
Get full text
Get full text
Article -
9
Encryption Technology on Windows Workstation
Published 2004Get full text
Get full text
Final Year Project -
10
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…For data security, block ciphers like advanced encryption standard are needed. Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
Get full text
Get full text
Get full text
Article -
11
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
12
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
Get full text
Get full text
Research Reports -
16
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis
