Search Results - (( developing knowledge encryption algorithm ) OR ( java optimization method algorithm ))
Search alternatives:
- knowledge encryption »
- java optimization »
- method algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…There arc 3 types of encryption algorithm provided which are 3-DES , RC 4 and RC2. …”
Get full text
Get full text
Thesis -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
5
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
6
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
8
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
9
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
12
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For secure communication that is reliable, secure, and has good performance, the focus is on developing Double Encryption System (DES). The combination of synchronization of chaos and symmetric encryption is called DES. …”
Get full text
Get full text
Get full text
Thesis -
13
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
15
-
16
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
17
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…An inappropriate selection of materials for engineering component would result in entire product failure which ultimately has a negative impact on the society. Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
Get full text
Get full text
Thesis -
18
-
19
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section -
20
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section
