Search Results - (( development application encryption algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6
  7. 7
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9
  10. 10

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper focusing on encrypting and decrypting text sent through the application. …”
    Get full text
    Get full text
    Student Project
  13. 13
  14. 14
  15. 15

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19
  20. 20

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…This investigation takes the form of an IoT environment, beginning with an in-depth examination of the AAḃ encryption scheme design, and continuing into the development and real-world application of AAḃ from its mathematical origin. …”
    Get full text
    Get full text
    Thesis