Search Results - (( developing optimisation based algorithm ) OR ( java applications security algorithm ))
Search alternatives:
- developing optimisation »
- optimisation based »
- java applications »
-
1
-
2
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The results validate the better performance of the developed algorithms in single objective optimisation, constrained optimisation and multi objective optimisation problems of various fields.…”
Get full text
Get full text
Thesis -
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
5
Intergrated multi-objective optimisation of assembly sequence planning and assembly line balancing using particle swarm optimisation
Published 2013“…The aim of this research is to establish a methodology and algorithm for integrating ASP and ALB optimisation using Particle Swarm Optimisation. …”
Get full text
Get full text
Thesis -
6
Chaotic Immune Symbiotic Organisms Search algorithm for solving optimisation problem
Published 2023“…Heuristics-based algorithms were introduced to counter the problem faced by classical optimisation techniques. …”
Article -
7
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
8
Metaheuristic algorithms applied in ANN salinity modelling
Published 2024“…The CPSOCGSA performance was evaluated by various single-based ones, including multi-verse optimiser (MVO), marine predator's optimisation algorithm (MPA), particle swarm optimiser (PSO), and the slim mould algorithm (SMA). …”
Get full text
Get full text
Get full text
Article -
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Multi-objective optimisation of assembly line balancing type-e problem with resource constraints
Published 2016“…In this research, a Genetic-based Algorithm was used as an optimisation approach. …”
Get full text
Get full text
Thesis -
11
Sustainable Management Of River Water Quality Using Artificial Intelligence Optimisation Algorithms
Published 2021“…Least Square Support Vector Machine (LSSVM) base models with linear kernel, polynomial kernel and Radial Basis Function (RBF) kernel and its hybrid models with integration of Hybrid of Particle Swarm Optimisation and Genetic Algorithm (HPSOGA), Whale Optimisation Algorithm based on Self-adapting Parameter Adjustment and Mix Mutation Strategy (SMWOA) and Ameliorative Moth Flame Optimisation (AMFO) were developed and used to predict the WQI at stations 1K06, 1K07 and 1K08 of the Klang River in Selangor, Malaysia. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The first modification enhances the initial population of the MBGWO using a heuristic based Ant Colony Optimisation algorithm. The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
13
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
14
The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification
Published 2020“…There are two modified instance-based classifiers of BFOA were developed in this study. …”
Get full text
Get full text
Get full text
Thesis -
15
Aco-based feature selection algorithm for classification
Published 2022“…The modified graph clustering ant colony optimisation (MGCACO) algorithm is an effective FS method that was developed based on grouping the highly correlated features. …”
Get full text
Get full text
Thesis -
16
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
Published 2018“…The second stage (i.e. approach development stage) is the development of the proposed CTDHH approach, which includes two main parts, the cost optimisation model of SWFS and the dynamic hyper-heuristic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm
Published 2019“…For optimisation purpose, this research proposed a relatively new algorithm called the Moth-Flame Optimisation (MFO). …”
Get full text
Get full text
Thesis -
18
A comparative evaluation of PID-based optimisation controller algorithms for DC motor
Published 2023Article -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis
