Search Results - (( development a optimization algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Before incorporating the optimization methods, a sizing algorithm for large-scale GCPV systems was developed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Advancements in crop water modelling: algorithmic developments and parameter optimization strategies for sustainable agriculture: a review by Sulaiman, Ahmad S. S., Wayayok, Aimrun, Aziz, Samsuzana A., Yun, Wong Mui, Leifeng, Guo

    Published 2024
    “…This paper presents a review on algorithm development and crop water modelling with a focus on optimizing significant parameters related to crop factors, soil factors, and weather factors. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms by Sulaiman, Noorazliza

    Published 2017
    “…One of BIAs, artificial bee colony (ABC) optimization algorithm, has shown excellent performance in many applications compared to other optimization algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…The results have shown that the Ant Colony Optimization Algorithm produced a better predictive accuracy. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm by Ariff Nijay, Ramli

    Published 2023
    “…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations by Nouri, Hossein, Tang, Sai Hong

    Published 2013
    “…In addition, for this purpose matrix-based bacteria foraging optimization algorithm traced constraints handling (MBATCH) is developed. …”
    Get full text
    Get full text
    Article
  18. 18

    Assembly sequence optimization using the bees algorithm by Kamaruddin, Shafie, Azmi, Nabilah, Sukindar, Nor Aiman

    Published 2022
    “…As a result, the Bees Algorithm outperforms other algorithms in dealing with the multi-modal optimization problem of assembly sequence optimization.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…DE is developed based on an improved Genetic Algorithm and come with different strategies for faster optimization. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20