Search Results - (( development storage optimization algorithm ) OR ( java objective encryption algorithm ))

Refine Results
  1. 1

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Pumped-storage scheduling using particle swarm optimization / Amirul Asraf Razali by Razali, Amirul Asraf

    Published 2012
    “…This is because particle swarm optimization (PSO) algorithm is developed to give the economical cost for the hydrothermal generation with pumped-storage unit to fulfill the constraint of thermal and hydro unit. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9
  10. 10

    Development of multi-objective optimization methods for integrated scheduling of handling equipment (AGVs, QCs, SP-AS/RS) in automated container terminals by Homayouni, Seyed Mahdi

    Published 2012
    “…Therefore, two meta-heuristic algorithms, namely genetic algorithm (GA) and simulated annealing (SA) algorithm, were developed to optimize the integrated scheduling of handling equipment. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The major contribution of this work lies in the develop of Prior Evaluation Cloud Storage Cost Optimization called (PECSCO) mechanism to optimize the cloud cost with least overhead. …”
    Conference paper
  12. 12
  13. 13
  14. 14
  15. 15

    Analysis and modeling of database storage optimization power consumption usage for green data centers by Wan Noor Hamiza, Wan Ali

    Published 2014
    “…This technique requires proxy candidate in order to drop some attribute for decrease the space storage. The proxies can be discovered by using a developed algorithm of functional dependencies (FDs) called as TANE algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Design and optimization of a compressed air energy storage (CAES) power plant by implementing genetic algorithm by Shamshirgaran, S. Reza, Ameri, M, Khalajiassadi, Morteza, Ahmadi, M. Hossein

    Published 2016
    “…The strong penalties of CO2 generation have forced the designers to develop systems having the least pollution. Almost two thirds of electrical output energy of a conventional gas turbine (GT) is consumed by its compressor section, which is the main motivation for the development of Compressed Air Energy Storage (CAES) power plants. …”
    Get full text
    Get full text
    Article
  18. 18

    Multi-Objective Optimal Energy Management of Nanogrid Using Improved Pelican Optimization Algorithm by Jamal S., Pasupuleti J., Rahmat N.A., Tan N.M.L.

    Published 2025
    “…This strategy, which is based on the improved pelican optimization algorithm (IPOA), involves the development of a multi-objective optimization (MOA) equation with several constraints, while taking into account the Malaysian grid purchasing and selling prices. …”
    Article
  19. 19
  20. 20

    Switching Time Optimization via Time Optimal Control for Natural Gas Vehicle Refueling by Mahidzal Dahari, Mahidzal

    Published 2007
    “…The implementation of Natural Gas Vehicle (NGV) refueling system using multipressure storage source requires a suitable controller to be developed. …”
    Get full text
    Get full text
    Thesis