Search Results - (( development loading optimization algorithm ) OR ( java objective encryption algorithm ))
Search alternatives:
- loading optimization »
- development loading »
- java objective »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
3
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations
Published 2013“…In addition, for this purpose matrix-based bacteria foraging optimization algorithm traced constraints handling (MBATCH) is developed. …”
Get full text
Get full text
Article -
7
Optimal under voltage load shedding based on stability index by using artificial neural network
Published 2020“…Nevertheless, to obtain the lowest amount to be shed in order to avoid voltage instability, optimization is required. An algorithm was developed to shed the optimal load by considering the load priority whereby the load with least priority will be shed first. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Optimal vehicle to grid planning and scheduling using double layer multi-objective algorithm
Published 2023“…Algorithms; Charging (batteries); Curve fitting; Electric load flow; Electric power systems; Electric vehicles; Energy management systems; Optimization; Reactive power; Real time control; Scheduling; Vehicles; Voltage control; Voltage regulators; Battery chargers; Bidirectional power flow; Multi objective algorithm; Optimization algorithms; Reactive power compensation; Real-time implementations; Revolutionary technology; Vehicle to grids; Electric power transmission networks; algorithm; electric vehicle; electricity supply; energy flow; energy planning; energy use; optimization; technological development…”
Article -
10
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
11
Optimal load shedding in power system using back tracking search algorithm
Published 2024text::Final Year Project -
12
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, another algorithm for maximum loadability identification using EP optimization technique was also developed. …”
Get full text
Get full text
Thesis -
13
Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices
Published 2021“…To solve this problem, an optimal load shedding approach, integrated with optimal DG sizing is proposed using the ABC-HC algorithm. …”
Get full text
Get full text
Thesis -
14
Optimization of neural network architecture using genetic algorithm for load forecasting
Published 2014“…In this paper, a computational intelligent technique genetic algorithm (GA) is implemented for the optimization of artificial neural network (ANN) architecture. …”
Get full text
Get full text
Conference or Workshop Item -
15
An evaluation of network load balancing through Ant Colony Optimization (ACO) based technique / Muhammad Nur Zikri Mohamad Hafizan
Published 2020“…This project works on developing an efficient network load balancing mechanism based on the Ant Colony Optimization (ACO) algorithm. …”
Get full text
Get full text
Student Project -
16
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Monograph -
17
Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm
Published 2016“…The results showed that the developed charging strategy achieved the required battery capacity and has reduced peak load and improved load factor thus reduces impacts on power system networks.…”
Get full text
Get full text
Undergraduates Project Papers -
18
Resource scheduling algorithm with load balancing for cloud service provisioning
Published 2019“…Increasing utilization of Virtual Machines through effective and fair load balancing is then achieved by dynamically selecting a request from a class using Multidimensional Queuing Load Optimization algorithm. …”
Get full text
Get full text
Article -
19
An Optimized Binary Scheduling Controller for Microgrid Energy Management Considering Real Load Conditions
Published 2024“…This study presents an optimal schedule controller for microgrid energy management, utilizing the Binary Particle Swarm algorithm (BPSO) to minimize costs and ensure optimal power delivery to loads. …”
Conference Paper -
20
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…The choice of a scheduling strategy has significant impact on the runtime Central Processing Unit, memory consumption as well as the storage systems. Load balancing optimization techniques such as Ant Colony Optimization (ACO), First Come First Served (FCFS), Round Robin (RR) and Particle Swarm Optimization (PSO) are popular techniques being used for scheduling and load balancing. …”
Get full text
Thesis
