Search Results - (( development storage optimization algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- storage optimization »
- development storage »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Pumped-storage scheduling using particle swarm optimization / Amirul Asraf Razali
Published 2012“…This is because particle swarm optimization (PSO) algorithm is developed to give the economical cost for the hydrothermal generation with pumped-storage unit to fulfill the constraint of thermal and hydro unit. …”
Get full text
Get full text
Thesis -
7
Optimization algorithms for energy storage integrated microgrid performance enhancement
Published 2023Article -
8
-
9
-
10
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
11
Development of multi-objective optimization methods for integrated scheduling of handling equipment (AGVs, QCs, SP-AS/RS) in automated container terminals
Published 2012“…Therefore, two meta-heuristic algorithms, namely genetic algorithm (GA) and simulated annealing (SA) algorithm, were developed to optimize the integrated scheduling of handling equipment. …”
Get full text
Get full text
Thesis -
12
Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism
Published 2025“…The major contribution of this work lies in the develop of Prior Evaluation Cloud Storage Cost Optimization called (PECSCO) mechanism to optimize the cloud cost with least overhead. …”
Conference paper -
13
-
14
-
15
Analysis and modeling of database storage optimization power consumption usage for green data centers
Published 2014“…This technique requires proxy candidate in order to drop some attribute for decrease the space storage. The proxies can be discovered by using a developed algorithm of functional dependencies (FDs) called as TANE algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Design and optimization of a compressed air energy storage (CAES) power plant by implementing genetic algorithm
Published 2016“…The strong penalties of CO2 generation have forced the designers to develop systems having the least pollution. Almost two thirds of electrical output energy of a conventional gas turbine (GT) is consumed by its compressor section, which is the main motivation for the development of Compressed Air Energy Storage (CAES) power plants. …”
Get full text
Get full text
Article -
18
Multi-Objective Optimal Energy Management of Nanogrid Using Improved Pelican Optimization Algorithm
Published 2025“…This strategy, which is based on the improved pelican optimization algorithm (IPOA), involves the development of a multi-objective optimization (MOA) equation with several constraints, while taking into account the Malaysian grid purchasing and selling prices. …”
Article -
19
Distribution network design for fixed lifetime perishable products: a model and solution approach
Published 2013“…Results show that the algorithm finds optimal or near optimal solutions even for large-size cases.…”
Get full text
Get full text
Get full text
Article -
20
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis
