Search Results - (( development process evolutionary algorithm ) OR ( java data encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…This research hopes to give a clear idea to the readers about ABS algorithm. Further research about this topic is recommended to increase the efficiency of ABS algorithm implemented in communication field, so that more different types of field can be encrypted and decrypted instead of plaintext.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Towards Software Product Lines Optimization Using Evolutionary Algorithms by Jamil, Muhammad Abid, K Nour, Mohamed, Alhindi, Ahmed Hasan, Awang Abu Bakar, Normi Sham, Arif, Muhammad, Muhammad Aljabri, Tareq

    Published 2019
    “…We report on the problem encoding, variation operators and different types of algorithms: Indicator Based Evolutionary Algorithm (IBEA), Non-Dominated Sorting Genetic Algorithm II (NSGA-II), Multi-Objective Evolutionary Algorithms based on Decomposition (MOEA/D) and Strength Pareto Evolutionary algorithm II (SPEA-II). …”
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Multiobjective evolutionary algorithms NSGA-II and NSGA-III for software product lines testing optimization by Jamil, Muhammad Abid, Alhindi, Ahmad, Arif, Muhammad, Nour, Mohamed K, Awang Abu Bakar, Normi Sham, Aljabri, Tareq Fahad

    Published 2020
    “…Each product in SPL having a different number of features need to be tested. Hence, the testing process of SPL can utilize a multi-objective optimization algorithm to optimize the testing process. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13
  14. 14

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim by Abdul Rahim, Siti Rafidah

    Published 2019
    “…In this study, Meta Evolutionary–Firefly Algorithm (EMEFA) was initially developed to expedite the computational time in multi-DG installation with improved accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency by Bello, AbdulKarim, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Zulzalil, Hazura

    Published 2018
    “…Regression testing performed to provide confidence on the newly or updated software system is a resource consuming process. To ease this process, various techniques are developed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Software testing optimization for large systems using agent-based and NSGA-II algorithms by Jamil, Muhammad Abid, Nour, Mohamed Kidher, Awang Abu Bakar, Normi Sham

    Published 2023
    “…Consequently, a multi-objective optimization technique can be used to optimize the large system testing process. The performance of a multi-objective Non-Dominated Sorting Genetic Algorithm II (NSGA-II) and evolutionary multi-agent system (EMAS) on Feature Models (FMs) to enhance large System testing is reported in this study.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa by Syed Mustaffa, Sharifah Azma

    Published 2020
    “…New automatic contingency analysis and ranking algorithm due to line and generator outages were separately developed considering the FVSI value. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Metric's thresholds for encoding evolutionary computing representation in software engineering problem by Md Sultan, Abu Bakar, Din, Jamilah, Zulzalil, Hazura, Bakar, Abubakar Diwani

    Published 2015
    “…This paper presents metrics thresholds encoding algorithm as an alternative to replace human experts in developing problem representation. …”
    Get full text
    Get full text
    Get full text
    Article