Search Results - (( development simple encryption algorithm ) OR ( java based optimization algorithm ))
Search alternatives:
- development simple »
- simple encryption »
- java »
-
1
Secret channel using video steganography
Published 2017“…Furthermore, password is not an encryption algorithm. Secret message without encrypted is the vulnerability to the secret message. …”
Get full text
Get full text
Get full text
Article -
2
-
3
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
4
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
5
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The algorithm is based on the Clonalg algorithm developed by de Castro and Von Zuben. …”
Get full text
Get full text
Conference or Workshop Item -
6
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
Get full text
Get full text
Conference or Workshop Item -
7
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
9
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
10
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
11
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
12
An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael
Published 2010“…This overview for advance encryption standard achieving a flexibility and uncomplicated handle with this algorithm, which is a challenge of researchers when be used as implementation. © 2010 Asian Network for Scientific Information.…”
Get full text
Get full text
Article -
13
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
Get full text
Get full text
Get full text
Article -
14
A heuristics approach for classroom scheduling using genetic algorithm technique
Published 2017“…The proposed of heuristics approach will prompt a superior utilization of the accessible classroom space for a given time table of courses at the university. Genetic Algorithm through Java programming languages were used in this study and aims at reducing the conflicts and optimizes the fitness. …”
Get full text
Get full text
Article -
15
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
16
A secure message handler using microsoft cryptoapi
Published 2003“…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. A simple application is also developed to illustrate how to use this module to develop the user applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A secure message handler using microsoft cryptoapi
Published 2003“…This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. A simple application is also developed to illustrate how to use this module to develop the user applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
19
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
20
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
