Search Results - (( developing function search algorithm ) OR ( java applications security algorithm ))
Search alternatives:
- developing function »
- java applications »
- function search »
-
1
-
2
-
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
4
Quantum-Behaved Lightning Search Algorithm to Improve Indirect Field-Oriented Fuzzy-PI Control for im Drive
Published 2023Conference Paper -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015“…The objective of this study is to develop a searching function using Boyer-Moore Horspool algorithm based on keyword in a medical database. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…The PRSS algorithm is an adaptive search technique that can learn a high performance knowledge structure in reactive environments that provide information as an objective function. …”
Get full text
Get full text
Article -
9
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
10
-
11
Hybrid Harmony Search Algorithm with Grey Wolf Optimizer and Modified Opposition-based Learning
Published 2019“…Most metaheuristic algorithms, including harmony search (HS), suffer from parameter selection. …”
Get full text
Get full text
Get full text
Article -
12
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…Visualization techniques help in understanding the searching behaviour of Genetic Algorithm. lt also makes possible the user interactions during the searching process. …”
Get full text
Get full text
Thesis -
13
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
14
A modified crow search algorithm with niching technique for numerical optimization
Published 2019“…The primitive crow search algorithm is a newly developed population-based algorithm which gained attention from the researchers of many fields as it needs only one parameter to be tuned. …”
Get full text
Get full text
Conference or Workshop Item -
15
A modified crow search algorithm with niching technique for numerical optimization
Published 2019“…The primitive crow search algorithm is a newly developed population-based algorithm which gained attention from the researchers of many fields as it needs only one parameter to be tuned. …”
Get full text
Get full text
Conference or Workshop Item -
16
A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem
Published 2021“…In this study, two metaheuristic algorithms, namely, modified flower pollination algorithm (MFPA) and carnivorous plant algorithm (CPA), were proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
18
Hybrid of firefly algorithm and pattern search for solving optimization problems
Published 2018“…In the final stage, the optimized values obtained from the FA during its maximum number of iteration are given as inputs to the pattern search algorithm. The pattern search is an optimization algorithm that further optimizes the values obtained in the maximum iterations of standard FA. …”
Get full text
Get full text
Article -
19
Chaos search in fourire amplitude sensitivity test
Published 2012“…Work in Artificial Intelligence (AI) often involves search algorithms. In many complicated problems, however, local search algorithms may fail to converge into global optimization and global search procedures are needed. …”
Get full text
Get full text
Get full text
Article -
20
Chaos Search in Fourier Amplitude Sensitivity Test
Published 2012“…Work in Artificial Intelligence (AI) often involves search algorithms. In many complicated problems, however, local search algorithms may fail to converge into global optimization and global search procedures are needed. …”
Get full text
Get full text
Get full text
Article
