Search Results - (( developing sequence optimization algorithm ) OR ( java a encryption algorithm ))
Search alternatives:
- developing sequence »
- a encryption »
- java a »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
2
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
4
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Provider independent cryptographic tools
Published 2003“…The library consists of cryptographic algorithms that include symmetric and asymmetric encryptions, key exchange, hashing algorithms and digital signature algorithms. …”
Get full text
Get full text
Get full text
Monograph -
8
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Message based random variable length key encryption algorithm.
Published 2009“…Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. …”
Get full text
Get full text
Article -
11
Assembly sequence optimization using the bees algorithm
Published 2022“…As a result, the Bees Algorithm outperforms other algorithms in dealing with the multi-modal optimization problem of assembly sequence optimization.…”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
15
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
16
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…The algorithm filtered the expected irrelevant DNA sequences in database from being computed for dynamic programming based optimal alignment process. …”
Get full text
Get full text
Get full text
Article -
17
Biometrics electronic purse
Published 1999“…A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator: article
Published 2010“…This paper presents the improvement of Smith-Waterman algorithm in comparing between two DNA sequence alignments. …”
Get full text
Get full text
Article -
19
Design and development of optimal path trace back using graph theory technique for accelerate DNA sequence alignment accelerator
Published 2010“…This paper presents the improvement of Smith-Waterman algorithm in comparing between two DNA sequence alignments. …”
Get full text
Get full text
Student Project -
20
Product assembly and disassembly sequence optimization based on genetic algorithm and design for assembly methodologies
Published 2009“…In this paper, an Artificial Intelligence (AI) technique, namely Genetic Algorithm (GA) is proposed to optimize product components assembly and disassembly sequences.The proposed methodology is developed and tested on an industrial product made of plastics with no integrated assembly and permanent joint parts.GA method is applied to determine the accuracy and optimum results based on 20 assembly and disassembly sequence solutions that was generated by the Design for Assembly methodology.The results indicated that GA based approach is able to obtain a near optimal solution for assembly and disassembly sequences.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
