Search Results - (( developing box based algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
-
1
Designing substitution boxes based on chaotic map and globalized firefly algorithm
Published 2019“…In this context, the proposed algorithm utilizes a new design for retrieving strong S- boxes based on standard firefly algorithm (SFA). …”
Get full text
Get full text
Thesis -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
3
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
4
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
5
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
Published 2021“…To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. …”
Get full text
Get full text
Get full text
Article -
6
Hybrid ant colony optimization algorithm for container loading problem
Published 2012“…The TB heuristic placed the base box on the container floor and packed the boxes on the base box by stacking them one by one until the container is full, whereas other researchers used the stack building heuristic to generate a set of box towers from all of the given boxes then only arranged them into the container. …”
Get full text
Get full text
Thesis -
7
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
8
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
Get full text
Get full text
Thesis -
9
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
10
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…In this thesis, new algorithms are proposed for the key generation, encryption and decryption module of KD-3D-CA block cipher based on von Neumann (3D) cellular automata. …”
Get full text
Get full text
Thesis -
11
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
14
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
15
The parallelization of the Keller box method on heterogeneous cluster of workstations
Published 2008“…The objective is to develop the parallel algorithm of the Keller-box method in purpose to solve a large size of matrix. …”
Get full text
Get full text
Get full text
Article -
16
Segmentation of pulmonary cavity in lung CT scan for tuberculosis disease
Published 2024“…To address this issue, we developed an algorithm that automatically generates a semantic segmentation mask of TB from the TB target detection boundary box. …”
Get full text
Get full text
Get full text
Article -
17
DESIGN AND DEVELOPMENT OF ANDROID-BASED LEARNING MEDIA FOR LEARNING ALGORITHM AND DATA STRUCTURE
Published 2021“…This study aims to design learning media algorithms and data structures based on Android. The research method uses a waterfall-type system development life cycle (SDLC). …”
Get full text
Get full text
Get full text
Proceeding -
18
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…The algorithm was then tested through a black box testing. …”
Get full text
Get full text
Get full text
Thesis -
19
CFD-based optimization of base pressure behavior on suddenly expanded flows at supersonic Mach numbers
Published 2022“…The input-output test cases for CFD analyses were developed by two statistical methods, namely central composite design (CCD) and Box-Behnken design (BBD). …”
Get full text
Get full text
Get full text
Article -
20
3D character reconstruction from 2D orthogonal images
Published 2025“…The proposed algorithm is organized into modular stages, allowing artists and developers to further improving the pipeline by integrating computer vision, AI models and 3D modelling and scripting techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
