Search Results - (( development authority encryption algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…The purpose of this study is to develop a new type of encryption methodbased on RSAtechnique. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Security enhancement of digital motion image transmission using hybrid AES-DES algorithm by Vishnu M.B., Tiong S.K., Zaini M., Koh S.P.

    Published 2023
    “…This paper outlines the possible weaknesses within the current AES encryption algorithm especially against algebraic based cryptanalysis. …”
    Conference paper
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…In particular, the Certificate Authority is a single entity that leads to a single point of failure, while the Attribute Authority works independently. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns by Hazzaa F., Qashou A., Al Barazanchi I.I., Sekhar R., Shah P., Bachute M., Abdulbaqi A.S.

    Published 2025
    “…This work will be exploited in our upcoming research to enhance AES performance by developing new encryption algorithm. ? 2024 The authors.…”
    Article
  10. 10

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  11. 11

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback by MUHAMMAD ASIM

    Published 2007
    “…Due to some intrinsic features of images, such as bulk data capacity and high correlation among pixels, traditional encryption algorithms such as IDEA, DES and AES are not suitable for practical image encryption, especially for real time applications. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  15. 15

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
    Article
  17. 17

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…Then, cryptosystem algorithm based on Hill Cipher and random number is implemented as encryption and decryption techniques as protection for registered users as stored in the database. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Secret sharing scheme for key management of secure data sharing in cloud by Abd Majid, Noorhafezan

    Published 2019
    “…There are five (5) phases for this study, identify problems and requirement analysis, design and analysis, design an algorithm, code development and result analysis, and documentations. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…The results of this study will remarkably facilitate the development of a practical secure cloud-based eHealth system.…”
    Get full text
    Get full text
    Get full text
    Thesis