Search Results - (( development programme optimization algorithm ) OR ( java data protection algorithm ))
Search alternatives:
- programme optimization »
- protection algorithm »
- java »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Investigation and validation of an eleven level symmetric modular multilevel inverter using grey wolf optimization and differential evolution control algorithm for solar PV applica...
Published 2021“…Originality/value: Attempted to develop a system with different optimization techniques. …”
Get full text
Get full text
Article -
7
Data Hiding Techniques In Digital Images
Published 2003“…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
8
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm
Published 2023“…There are many methods that can be used for power losses minimization such as Firefly Algorithm (FA), Ant Colony Optimization (ACO) and B-losses coefficient. …”
text::Final Year Project -
10
Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using asic design flow: article / Nurzaima Mahmod
“…This method provides magnificent speed up over than traditional sequential implementation methods while it sensitivity detection is still remained. To optimize the performance of the algorithm by exploiting parallelism in the design several techniques have been developed. …”
Get full text
Get full text
Article -
11
-
12
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
13
Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using ASIC design flow / Nurzaima Mahmod
Published 2010“…This method provides magnificent speed up over than traditional sequential implementation methods while it sensitivity detection is still remained. To optimize the performance of the algorithm by exploiting parallelism in the design several techniques have been developed. …”
Get full text
Get full text
Thesis -
14
Design of DNA sequence alignment accelerated system using 2-dimensional array and custom instruction on FPGA / Nur Dalilah Ahmad Sabri
Published 2018“…The proposed 2D Array on SW algorithm has been developed and designed by using ideas over previous work of CI on SW algorithm. …”
Get full text
Get full text
Thesis -
15
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…A heuristic called dynamic mapping and multi-stage CPP algorithm (DMMCPP) was developed to solve CPP as resource allocation in a distributed 5G-SDN-NFV-based network. …”
Get full text
Get full text
Thesis -
16
Design and development of high performance swa cell design for local DNA sequence alignment
Published 2017“…This study proposed three new DNA sequence alignment accelerator system cell design and architecture based on the Smith-Waterman Algorithm (SWA) named as the new Optimized SWA Linear Gap Penalty (OSL), Optimized SWA Affine Gap Penalty (OSA), and Optimized Recursive Variable Expansion SWA Linear Gap Penalty (ORSL). …”
Get full text
Get full text
Thesis -
17
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
18
Optimal load management strategy for enhanced time of use (ETOU) electricity tariff in Peninsular Malaysia / Mohamad Fani Sulaima
Published 2020“…Particle swarm optimization (PSO), evolutionary particle swarm optimization (EPSO), and ant colony optimization (ACO) algorithms were applied to optimize the simultaneous LM strategies of peak clipping, valley filling and load shifting in order to minimize the energy consumption and maximum demand costs, and improve economic indexes such as load factor and building economic efficiency response. …”
Get full text
Get full text
Thesis -
19
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…An energy and cost-efficient implementation of PRINCE algorithm implemented in an environment of a microprocessor system using XILINX FPGA board is developed. …”
Article -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
