Search Results - (( developing executable annealing algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- developing executable »
- executable annealing »
- annealing algorithm »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network
Published 2005“…The parallel simulated annealing algorithm is also developed and it reduces 64% of the time compared to sequential simulated annealing.…”
Get full text
Get full text
Thesis -
5
-
6
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Bitwise-based Routing Algorithms in Optical Multistage Interconnection Network
Published 2007“…In the first, the Improved Zero algorithm is proposed to solve the problem and secondly, the Bitwise Improved Zero algorithm is developed. …”
Get full text
Get full text
Thesis -
8
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
9
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
10
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
11
Load-Balancing Models for Scheduling Divisible Load on Large Scale Data Grids
Published 2009“…The third stage integrates the proposed DLT based models with GA algorithm to solve the time consuming problem. In addition, the integration of the proposed DLT model with Simulated Annealing (SA) algorithm has been also developed. …”
Get full text
Get full text
Thesis -
12
The design and applications of the african buffalo algorithm for general optimization problems
Published 2017“…Some of the successfully designed stochastic algorithms include Simulated Annealing, Genetic Algorithm, Ant Colony Optimization, Particle Swarm Optimization, Bee Colony Optimization, Artificial Bee Colony Optimization, Firefly Optimization etc. …”
Get full text
Get full text
Thesis -
13
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The whole constraint analyzer and the fitness function were combined with four SBTs (genetic algorithm, evolutionary algorithm, simulating annealing, and quantum genetic algorithm). …”
Get full text
Get full text
Get full text
Thesis
