Search Results - (( developing program window algorithm ) OR ( java data protection algorithm ))
Search alternatives:
- protection algorithm »
- developing program »
- window algorithm »
- java »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…Given the NP-Hard nature of the three models proposed in this thesis, two metaheuristic algorithms have been developed. A hybrid Particle Swarm Optimization-Bacterial Foraging Algorithm is developed for solving the single objective LIRP model. …”
Get full text
Get full text
Get full text
Thesis -
3
Overview of metaheuristic: classification of population and trajectory
Published 2010Get full text
Get full text
Monograph -
4
Encryption Technology on Windows Workstation
Published 2004“…This paper discusses the development of a new method for encrypting text of information in Microsoft Windows environment. …”
Get full text
Get full text
Final Year Project -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
8
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
9
Agent-based extraction algorithm for computational problem solving
Published 2015“…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
Get full text
Get full text
Thesis -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…With Windows as the operating system and the C# programming language in Visual Studio 2019, the program complies with the Extreme Programming (XP) software development method. …”
Get full text
Get full text
Get full text
Article -
12
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
13
Bi-objective mixed integer nonlinear programming model for low carbon location-inventory-routing problem with time windows and customer satisfaction
Published 2024“…An improved non-dominated sorting genetic algorithm II (IMNSGA-II) with an elite strategy is developed to solve the model. …”
Get full text
Get full text
Get full text
Article -
14
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This program was tested on a Windows platform, which is a typical development environment for Web Based Applications for Energy Management System in UiTM. …”
Get full text
Get full text
Thesis -
15
-
16
Data Hiding Techniques In Digital Images
Published 2003“…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
17
Development of an education simulator for particle swarm optimization in solving economic dispatch problems: article / Mohd Hafiz Mat Hussain
Published 2009“…The Graphical User Interface (GUI) program design and PSO algorithm used in this study was implemented by using MATLAB 7.6.0 (R2008a)…”
Get full text
Get full text
Article -
18
Development of an education simulator for particle swarm optimization in solving economic dispatch problems / Mohd Hafiz Mat Hussain
Published 2009“…The Graphical User Interface (GUI) program design and PSO algorithm used in this study was implemented by using MATLAB 7.6.0 (R2008a).…”
Get full text
Get full text
Thesis -
19
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…A robust strategy, called the Pseudo Randomized Search Strategy (PRSS) has been developed to counter the effect of this AS policy. …”
Get full text
Get full text
Article
