Search Results - (( development code evolution algorithm ) OR ( java data protection algorithm ))
Search alternatives:
- protection algorithm »
- evolution algorithm »
- development code »
- code evolution »
- java »
-
1
The evolution and trend of chain code scheme
Published 2008Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…To achieve this objective, an iterative approach based on swarm intelligence is used to find the optimal CQI threshold at which the competing criteria are optimized. Since the developed downlink scheduler and the partial feedback scheme affect the QoS, self-configured versions of both algorithms are developed to provide QoS provisioning. …”
Get full text
Get full text
Thesis -
5
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
8
Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network
Published 2021“…These demands have led to the technological responses such as the advancement in radio access, coding and modulation schemes as well as spectrum(carrier) aggregation and cognitive radio capabilities of Long Term Evolution - Advanced (LTE-A) and Fifth Generation (5G) networks developed by the Third Generation Partnership Project (3GPP). …”
Get full text
Get full text
Conference or Workshop Item -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Identification and predictive control of spray tower system using artificial neural network and differential evolution algorithm
Published 2015“…This includes the use of an artificial neural network (ANN) based predictive control strategy and differential evolution (DE) optimization algorithm to determines the optimal control signal, uk (liquid droplet size, dD) by minimizing the cost function such that the output is set below the allowable PM concentration. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Data Hiding Techniques In Digital Images
Published 2003“…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
12
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
14
-
15
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…The rationale behind developing algorithms using real encoding of chromosome representations is the limitations of binary encoding. …”
Get full text
Get full text
Thesis -
18
Data Management System for Local Entrepreneur
Published 2019“…In the early 1950s, the first computer programs were developed and focused almost completely on coding algorithms and languages. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Application of dynamic mesh to model surface evolution under solid particles erosion in positive choke geometries
Published 2026“…These findings contribute to the development of transient erosion models, addressing the limitations of steady-state models in capturing the dynamic evolution of choke geometry under erosion.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
