Search Results - (( developing function bat algorithm ) OR ( java information security algorithm ))
Search alternatives:
- developing function »
- java information »
- bat algorithm »
- function bat »
-
1
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The superior performances of the developed bats echolocation-inspired algorithms are verified through rigorous tests with optimisation benchmark test functions and problems. …”
Get full text
Get full text
Thesis -
2
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…In the fourth phase, the newly developed algorithm undergoes testing on the formulated ROOPs and compared to several contemporary optimizer algorithms. …”
Get full text
Get full text
Thesis -
4
Improved Bat Algorithm for faster convergence in solving optimisation problem
Published 2021“…In this study, one of the metaheuristic algorithms known as the Bat Algorithm (BA) has been discussed. …”
Get full text
Get full text
Get full text
Thesis -
5
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…Experimental and statistical analyses show that, in comparison with the bat as well as variants of the bat and state-of-the-art algorithms, the proposed algorithm substantially outperforms them significantly, based on MSE and BER.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Therefore, SANAsms system ensures that information (SMS) interchange between sender and receiver is secured and protected because the messages containing delicate information are stored securely and remain undisclosed even when the device is accessed by an adversary. …”
Get full text
Get full text
Conference or Workshop Item -
8
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions
Published 2014“…Owing to the fact that they are new and much of their relative performance are still unknown (as compared to other established meta-heuristic algorithms), Bacterial Foraging Optimization Algorithm (BFO) and Bat Algorithm (BA) have been adopted for comparison using the 12 selected benchmark functions. …”
Get full text
Get full text
Conference or Workshop Item -
10
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
11
An application of modified adaptive bats sonar algorithm (MABSA) on fuzzy logic controller for dc motor accuracy
Published 2021“…Therefore, this research presents works on the FLC system which is the fuzzy inference system that will be optimized by the modified adaptive bats sonar algorithm (MABSA) for the DC servo motor position control. …”
Get full text
Get full text
Thesis -
12
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
Get full text
Get full text
Student Project -
13
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
15
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Automatic generation of content security policy to mitigate cross site scripting
Published 2016Get full text
Get full text
Conference or Workshop Item -
18
Flood Routing in River Reaches Using a Three-Parameter Muskingum Model Coupled with an Improved Bat Algorithm
Published 2018“…The present study attempted to develop a three-parameter Muskingum model considering lateral flow for flood routing, coupling with a new optimization algorithm namely, Improved Bat Algorithm (IBA). …”
Get full text
Get full text
Article -
19
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Review of Multi-Objective Swarm Intelligence Optimization Algorithms
Published 2021“…These reviewed algorithms were mainly developed to solve continuous MOPs. …”
Get full text
Get full text
Article
