Search Results - (( developing continuous optimization algorithm ) OR ( java mean encryption algorithm ))*

Search alternatives:

Refine Results
  1. 1

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…A simple PIN code verlfication is no longer suflcient and would require a more complex and fools proof authentication method. A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Modification of particle swarm optimization algorithm for optimization of discrete values by Mohd Yassin, Ahmad Ihsan, Jusoh, Muhammad Huzaimy, Abdul Rahman, Farah Yasmin

    Published 2011
    “…Stochastic optimization algorithms are a new breed of optimizers that have recently been developed. …”
    Get full text
    Get full text
    Research Reports
  6. 6

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimization of travelling salesman problem with precedence constraint using modified GA encoding by M. F. F., Ab Rashid, N. M. Zuki, N. M., F. R. M., Romlay, M., Jusop

    Published 2018
    “…The optimization algorithm to deal with this problem is continuously developed and improved to enhance its performance. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A New Quadratic Binary Harris Hawk Optimization For Feature Selection by Abdullah, Abdul Rahim, Too, Jing Wei, Mohd Saad, Norhashimah

    Published 2019
    “…However, the original HHO is developed to solve the continuous optimization problems, but not to the problems with binary variables. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Review of Multi-Objective Swarm Intelligence Optimization Algorithms by Yasear, Shaymah Akram, Ku Mahamud, Ku Ruhana

    Published 2021
    “…These reviewed algorithms were mainly developed to solve continuous MOPs. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid by Abdul Hamid, Zulkifli

    Published 2013
    “…The hybrid algorithm is termed as the Blended Crossover Continuous Ant Colony Optimization (BX-CACO). …”
    Get full text
    Get full text
    Book Section
  12. 12
  13. 13

    Genetic-local hybrid optimizer for solving advance layout problem by Taha, Imad, Ibrahim Habra, Hind Saleem

    Published 2006
    “…Results are achieved through the use of local optimizer, separation algorithm with genetic algorithm also called hybrid simple genetic. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Improvement and application of particle swarm optimization algorithm by Deevi, Durga Praveen, Kodadi, Sharadha, Allur, Naga Sushma, Dondapati, Koteswararao, Chetlapalli, Himabindu, Perumal, Thinagaran

    Published 2025
    “…Finally, real-world tests are performed to verify the proposed Algorithm's efficacy compared to existing optimization methods. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer by Alsewari, Abdul Rahman Ahmed, Sinan, Q. Salih

    Published 2019
    “…In this research, a novel swarm-based metaheuristic algorithm which depends on the behavior of nomadic people was developed, it is called ‘‘Nomadic People Optimizer (NPO)’’. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…Thus, a web-based route optimization is proposed with the objectives of developing a system that is able to find the shortest route to deliver. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Study of optimal EG placement in radial distribution system using real coded genetic algorithm by M. H., Sulaiman, Omar, Aliman

    Published 2011
    “…This method is developed in MATLAB. The IEEE‐69 bus system is utilized as a test case in this study.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20