Search Results - (( developing program window algorithm ) OR ( java data protection algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…Given the NP-Hard nature of the three models proposed in this thesis, two metaheuristic algorithms have been developed. A hybrid Particle Swarm Optimization-Bacterial Foraging Algorithm is developed for solving the single objective LIRP model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This paper discusses the development of a new method for encrypting text of information in Microsoft Windows environment. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Simulation and Visualization of TSP Using Ant Colony Optimization by Tri Basuki, Kurniawan, Misinem, ., Astried, ., Joan Angelina, Widians

    Published 2023
    “…With Windows as the operating system and the C# programming language in Visual Studio 2019, the program complies with the Extreme Programming (XP) software development method. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  13. 13
  14. 14

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This program was tested on a Windows platform, which is a typical development environment for Web Based Applications for Energy Management System in UiTM. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of an education simulator for particle swarm optimization in solving economic dispatch problems: article / Mohd Hafiz Mat Hussain by Mat Hussain, Mohd Hafiz

    Published 2009
    “…The Graphical User Interface (GUI) program design and PSO algorithm used in this study was implemented by using MATLAB 7.6.0 (R2008a)…”
    Get full text
    Get full text
    Article
  18. 18

    Development of an education simulator for particle swarm optimization in solving economic dispatch problems / Mohd Hafiz Mat Hussain by Mat Hussain, Mohd Hafiz

    Published 2009
    “…The Graphical User Interface (GUI) program design and PSO algorithm used in this study was implemented by using MATLAB 7.6.0 (R2008a).…”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…A robust strategy, called the Pseudo Randomized Search Strategy (PRSS) has been developed to counter the effect of this AS policy. …”
    Get full text
    Get full text
    Article