Search Results - (( developing interactive optimization algorithm ) OR ( java mean encryption algorithm ))
Search alternatives:
- developing interactive »
- java »
-
1
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Biometrics electronic purse
Published 1999“…A simple PIN code verlfication is no longer suflcient and would require a more complex and fools proof authentication method. A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing
Published 2015“…In doing so, this paper reviews two existing parameter free optimization algorithms involving Teaching Learning Based Optimization (TLBO) and Fruitfly Optimization Algorithm (FOA) in an effort to promote their adoption for CIT.…”
Get full text
Get full text
Get full text
Article -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
6
Whale optimization algorithm strategies for higher interaction strength t-way testing
Published 2022“…To ensure that WOA conquers premature convergence and avoids local optima for large search spaces (owing to high-order interaction), three variants of WOA have been developed, namely Structurally Modified Whale Optimization Algorithm (SWOA), Tolerance Whale Optimization Algorithm (TWOA), and Tolerance Structurally Modified Whale Optimization Algorithm (TSWOA). …”
Get full text
Get full text
Get full text
Article -
7
-
8
TBat: A Novel Strategy for Minimization of T-Way Interaction Test Suite Based on the Particle Swarm Optimization and the Bat Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
Sequence t-way test generation using the barnacles mating optimizer algorithm
Published 2021“…More precisely, we focus on the generation of test cases due to the ordering of inputs (or sequence) using the newly developed Barnacles Mating Optimizer (BMO) Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Heuristic task scheduling algorithms for optimal resource utilisation in grid computing
Published 2020“…This system usually handles workloads that are not interactive and include huge amount of data. The current challenge facing researchers is to determine the optimal task scheduling method that provides optimal resource utilisation in this extremely heterogeneous environment. …”
Get full text
Get full text
Get full text
Article -
12
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019“…To overcome the combinatorial optimization problem, Jaya algorithm is proposed to apply in this project since metaheuristic algorithm is fast in optimization and this strategy is named as CTJ. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
Published 2020“…Addressing the aforementioned issues, this research proposes the development and implementation of hybrid t-way strategy based Migrating Birds Optimization Algorithm (MBO) and Genetic Algorithm (GA) with elitism, termed Elitist Hybrid MBO-GA. …”
Get full text
Get full text
Thesis -
14
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…In line with the emerging field called Search based Software Engineering, many recently developed t-way strategies have adopted meta-heuristic algorithms as the basis of their implementations such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization Algorithm, Particle Swarm Optimization, Harmony Search and Cuckoo Search, owing their superior performance in term of test size reduction as compared to general computational based strategies, such as General t-way, Test Vector Generator, In Parameter Order General, Jenny, and Automatic Efficient Test Generator. …”
Get full text
Get full text
Thesis -
15
How Does Image Complexity Affect the Accuracy of an Interactive Image Segmentation Algorithm?
Published 2025“…By introducing a dynamic stroke allocation approach and evaluating different configurations, the research provides insights into optimizing accuracy based on image complexity. The adaptive strategy improves segmentation performance and guides the development of robust algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Stochastic optimal control of economic growth model under research and development investment with Kalman filtering approaches
Published 2022“…This article examines an economic growth model that expresses the interaction between production, technology stock, and research and development (R&D) investments. …”
Get full text
Get full text
Article -
17
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Optimization is a crucial process to select the best parameters in single and multi-objective problems for manufacturing process.However,it is difficult to find an optimization algorithm that obtain the global optimum for every optimization problem.Artificial Bees Colony (ABC) is a well-known swarm intelligence algorithm in solving optimization problems.It has noticeably shown better performance compared to the state-of-art algorithms.This study proposes a novel hybrid ABC algorithm with β-Hill Climbing (βHC) technique (ABC-βHC) in order to enhance the exploitation and exploration process of the ABC in optimizing carbon nanotubes (CNTs) characteristics.CNTs are widely used in electronic and mechanical products due to its fascinating material with extraordinary mechanical,thermal,physical and electrical properties. …”
Get full text
Get full text
Get full text
Thesis -
18
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…Hence, a novel humanmachine interaction is developed in the proposed approach. …”
Get full text
Get full text
Thesis -
19
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…Optimization has developed powerful algorithms for solving complex problems efficiently. …”
Get full text
Get full text
Article -
20
Operating a reservoir system based on the shark machine learning algorithm
Published 2018“…In the current study, the shark machine learning algorithm (SMLA) is proposed to develop an optimal rule for operating the reservoir. …”
Get full text
Get full text
Article
