Search Results - (( developing implementation bat algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4

    Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
    Get full text
    Get full text
    Article
  5. 5

    Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application of adaptive bats sonar algorithm to minimise car side impact design by Tan, Hon Seong

    Published 2017
    “…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli by Ramli, Muhammad Harith

    Published 2017
    “…Bat algorithm is chosen for the development of the prototype for segmentation and classification purpose. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10

    A Bat-inspired Strategy for Pairwise Testing by Alsariera, Yazan A., Mazlina, Abdul Majid, Kamal Z., Zamli

    Published 2015
    “…Complementing the existing work, we propose a novel design and implementation of Bat-inspired algorithm (BA) for pairwise strategy, called Bat-inspired pairwise testing strategy (BPTS). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A bat-inspired testing strategy for generating constraints pairwise test suite by Alsariera, Yazan A., Ahmed, Hussam Alddin Shihab, Alamri, Hammoudeh S., Mazlina, Abdul Majid, Kamal Z., Zamli

    Published 2018
    “…This paper proposes an enhancement design and implementation of BTS strategy for constraints pairwise test generation based on the bat-inspired algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions by Mazlina, Abdul Majid, Alsariera, Yazan A., Alamri, Hammoudeh S., Nasser, Abdullah M., Kamal Z., Zamli

    Published 2014
    “…Over the last 30 years, many meta-heuristic algorithms have been developed in the literature including that of Simulated Annealing (SA), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search Algorithm (HS) to name a few. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  15. 15

    A bat-inspired t-way strategy for mixed-strength test suite generation by Ahmad, Yazan Sadeq Al Sariera

    Published 2017
    “…BTS is the first t-way strategy that adopts the Bat-inspired algorithm as its core implementation and adopts the Hamming distance as the final selection criteria to enhance the exploration of new solution. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Benchmarking of Bat-inspired Interaction Testing Strategy by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B.

    Published 2016
    “…T-way interaction testing has been extensively exploited resulting into many prototypes strategy implementations. Recently, there are growing interests for adopting optimization algorithms as the basis of the newly developed strategies contributing to the new and upcoming search based software testing (SBST) area of research. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A Surrogate Assisted Quantum-Behaved Algorithm for Well Placement Optimization by Islam, J., Nazir, A., Hossain, M.M., Alhitmi, H.K., Kabir, M.A., Jallad, A.-H.M.

    Published 2022
    “…The proposed approach utilizes different metaheuristic optimization techniques such as the Quantum-inspired Particle Swarm Optimization and the Quantum-behaved Bat Algorithm in different implementation phases. …”
    Get full text
    Get full text
    Article
  19. 19

    Application of augmented bat algorithm with artificial neural network in forecasting river inflow of hydroelectric reservoir stations in Malaysia by Joe Wee Wei, Mr.

    Published 2023
    “…Thus, Bat Algorithm (BA) was used to enhance the efficiency of ANN in forecasting upstream river SF, as BA is capable of switching from the “explore to exploit” function which could increase the rate of convergence at the initial stage and deliver a quick result for a majority of a classification problem. …”
    text::Thesis
  20. 20

    IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2024
    “…Additionally, simulation results confirm that the proposed algorithm IWDSA exhibits outstanding performance compared to other algorithms utilizing optimization techniques, including genetic algorithms, bat algorithms, ant colony optimization, and swarm optimization. …”
    Get full text
    Get full text
    Get full text
    Article