Search Results - (( developing program cell algorithm ) OR ( java data protection algorithm ))
Search alternatives:
- protection algorithm »
- developing program »
- cell algorithm »
- program cell »
- java »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
A study on development of automation diagnosis of liquid based cytology
Published 2015“…A cell diagnosis program based on GUI, combined with the imaging process and the diagnosis algorithms were developed to automate the test process. …”
Get full text
Get full text
Get full text
Article -
8
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…The program is being develop using this algorithm. The evaluation and comparison also been carried out between this method and Kernighan-Lin method.…”
Get full text
Get full text
Thesis -
9
A bacteria foraging algorithm for solving integrated multi-period cell formation and subcontracting production planning in a dynamic cellular manufacturing system
Published 2011“…In addition, a newly-developed BFA-based optimisation algorithm has been compared with the branch and bound algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Data Hiding Techniques In Digital Images
Published 2003“…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
11
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…In this regard, 4 mathematical programming models are developed for forming cells and scheduling the materials on appropriate machines while the system costs are considered uncertain. …”
Get full text
Get full text
Thesis -
12
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Optimizing kindergarten schedule using : graph coloring / Nur Nabilah Salleh Muner
Published 2019“…The greedy algorithm was used to color the graph and it was supported by the C++ program. …”
Get full text
Get full text
Research Reports -
14
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Recent research in cooperative path planning algorithms for multi-agent using mixed- integer linear programming
Published 2016“…This paper will review and compare the performances of those existing methods that can find solution without graph search algorithm such as Mixed-Integer Linear Programming (MILP) techniques which exactly solves the problem and then propose four alternative MILP formulations which are computationally less intensive and suited for real-time purposes, but yield a theoretically guaranteed suboptimal solution.…”
Get full text
Get full text
Article -
17
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…Therefore the path extractor program proposed incorporates the characteristics of a depth-first search algorithm by considering the specifications of a cell-based design. …”
Get full text
Get full text
Thesis -
18
Fault detection with optimum March Test Algorithm
Published 2012“…Therefore to improve fault detection, an automation program is developed based on sequence operation (SQ) generation rules. …”
Get full text
Conference or Workshop Item -
19
Development of an integrated model for production planning and cell formation in cellular manufacturing systems
Published 2010“…However, only a few studies explicitly and simultaneously incorporate the CMS context, production planning and cell formation problem. In this thesis, a mathematical programming model is developed using an integrated approach for production planning and CF problems in a CMS. …”
Get full text
Get full text
Thesis -
20
Development of capability-based virtual cellular manufacturing systems in dual-resource constrained settings over semi-distributed layouts
Published 2012“…The performance of the developed CBVCMSs is improved by utilizing a novel layout namely Semi-Distributed Layouts (SDLs) using Genetic Algorithms (GAs). …”
Get full text
Get full text
Thesis
