Search Results - (( developing state optimization algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Multi-state PSO GSA for solving discrete combinatorial optimization problems by Ismail, Ibrahim

    Published 2016
    “…As a consequence, multi-state particle swarm optimization (MSPSO) and multi-state gravitational search algorithm (MSGSA) are developed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Stochastic optimal control of economic growth model under research and development investment with Kalman filtering approaches by Lim, Yue Yuin, Kek, Sie Long, Leong, Wah June

    Published 2022
    “…These approaches aim to estimate the state dynamics from different perspectives. With these state estimates, two different computational algorithms are proposed, the EKF for state-control (EKF4SC) and UKF for state-control (UKF4SC) algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Using the evolutionary mating algorithm for optimizing deep learning parameters for battery state of charge estimation of electric vehicle by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Nor Farizan, Zakaria, Mohd Mawardi, Saari

    Published 2023
    “…This paper presents the application of a recent metaheuristic algorithm namely Evolutionary Mating Algorithm (EMA) for optimizing the Deep Learning (DL) parameters to estimate the state of charge (SOC) of a battery for an electric vehicle in the real environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems by Ismail, Razidah

    Published 2005
    “…Subsequently, the inverse Fuzzy State Space algorithm is formulated for a multipleinput single-output system, which leads to the derivation of Modified Optimized Defuzzified Value Theorem. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Nature-Inspired Heuristic Frameworks Trends in Solving Multi-objective Engineering Optimization Problems by Chang C.C.W., Ding T.J., Ee C.C.W., Han W., Paw J.K.S., Salam I., Bhuiyan M.A.S., Kuan G.S.

    Published 2025
    “…This review paper provides in-depth discussions on various challenges and breakthroughs in numerous state-of-the-art nature-inspired artificial intelligence (AI) algorithms in solving multi-objective optimization engineering problems with emphasis on the mathematical modelling and algorithm developments. …”
    Review