Search Results - (( exploring a function algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An improved grey wolf with whale algorithm for optimization functions by Asgher, Hafiz Maaz

    Published 2022
    “…The Grey Wolf Optimization (GWO) is a nature-inspired, meta-heuristic search optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    PSO-LFDE Algorithm on Constrained Real-Parameter Optimisation Test Functions by Nafrizuan, Mat Yahya, Nur Iffah, Mohamed Azmi

    Published 2023
    “…The results indicated that the PSO-LFDE has achieved competitive results on the single-objective constrained real-parameter optimisation test functions as compared to PSO algorithm by Gaing. Thus, the PSO-LFDE is validated as a stable, well-designed algorithm and can be a functional alternative approach to deal with various single-objective constrained real-parameter optimisation problems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Impact of Balanced Exploration and Exploitation on High-dimensional Feature Selection with Hierarchical Whale Optimisation Algorithm by Yab, Li Yu, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2024
    “…The HiWOA incorporates a two-phase strategy comprising a nonlinear control parameter based on the arcsine function and a hierarchical position-update mechanism adapted from the Grey Wolf Optimiser. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new HMCR parameter of harmony search for better exploration by Mansor, N.F., Abas, Z.A, Rahman, A.F.N.A, Shibghatullah, A.S., Sidek, S.

    Published 2016
    “…As a meta-heuristic algorithm, Harmony Search (HS) algorithm is a population-based meta-heuristics approach that is superior in solving diversified large scale optimization problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A new HMCR parameter of harmony search for better exploration by Nur Farraliza, Mansor, Abas, Z.A, Rahman, A.F.N.A, Shibghatullah, A.S., Sidek, S

    Published 2015
    “…As a meta-heuristic algorithm, Harmony Search (HS) algorithm is a population-based meta-heuristics approach that is superior in solving diversified large scale optimization problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Ringed seal search for global optimization via a sensitive search model / Younes Saadi by Younes, Saadi

    Published 2018
    “…The proposed algorithm is characterized by a search model namely the sensitive search model, where the exploitation-exploration is adaptively balanced. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Hybrid path planning for indoor robot with Laplacian Behaviour-based control via four point-explicit group by Azali Saudi, Jumat Sulaiman

    Published 2014
    “…In this paper, a robust searching algorithm to generate path planning for mobile robot is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…The improvements of the original PSO algorithm are proposed by updating its exploitation phase by incorporating the GWO algorithm because of its strong exploitation capability and the exploration phase using a cellular automaton due to its ability to explore more area by constructing new neighbours. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Algorithm in the fluidized-bed reactor for the polymerization of propylene by Zanil, Mohd Fauzi, Chan, K.O., Hussain, Mohd Azlan

    Published 2019
    “…The multiple searches is proposed in the exploration phase to evaluate the multi objective functions. …”
    Get full text
    Get full text
    Article
  20. 20