Search Results - (( developing world encryption algorithm ) OR ( java based optimization algorithm ))
Search alternatives:
- developing world »
- world encryption »
- java »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…This investigation takes the form of an IoT environment, beginning with an in-depth examination of the AAḃ encryption scheme design, and continuing into the development and real-world application of AAḃ from its mathematical origin. …”
Get full text
Get full text
Thesis -
3
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
Get full text
Get full text
Thesis -
4
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The importance of data security in today’s world cannot be overemphasized. Numerous data security and hiding algorithms have been developed in the last decade. …”
Get full text
Get full text
Student Project -
5
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
6
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
Get full text
Get full text
Conference or Workshop Item -
10
Doctor-patient remote consultation system with secure medical images
Published 2022“…In this rapid developing world, everything around us has becoming more and more digital related. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
12
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
13
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The processors perform their respective dedicated algorithm-intensive computations. This thesis presents the architecture for implementation of the new Advanced Encryption Standard (AES) in hardware for operating under SoC environment. …”
Get full text
Get full text
Thesis -
15
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
16
Analysis of image steganography using AES / Nur Amira Muhamad Ghazali
Published 2020“…In this project, we combine the method of cryptography and steganography using Advanced Encryption Standard (AES) and Least Significant Bits (LSB) algorithms. …”
Get full text
Get full text
Thesis -
17
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
Get full text
Get full text
Get full text
Article -
18
A heuristics approach for classroom scheduling using genetic algorithm technique
Published 2017“…The proposed of heuristics approach will prompt a superior utilization of the accessible classroom space for a given time table of courses at the university. Genetic Algorithm through Java programming languages were used in this study and aims at reducing the conflicts and optimizes the fitness. …”
Get full text
Get full text
Article -
19
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
20
Feasibility of quantum cryptography with AES for secure communication
Published 2026Get full text
Get full text
Get full text
Get full text
Proceeding Paper
