Search Results - (( exploring some function algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem by Lee, Wei Wen, Hashim, Mohd Ruzaini

    Published 2023
    “…Four types of benchmark functions are applied to test the performances of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection by Iqbal, Muhammad

    Published 2023
    “…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Improved cuckoo search based neural network learning algorithms for data classification by Abdullah, Abdullah

    Published 2014
    “…This exploration and exploitation method followed in the proposed HACPSO algorithm makes it to converge to global optima with more efficiency than the original Cuckoo Search (CS) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    The effect of job satisfaction on the relationship between organizational culture and organizational performance by Imran, Muhammad

    Published 2023
    “…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An improved artificial bee colony algorithm for training multilayer perceptron in time series prediction by Shah, Habib

    Published 2014
    “…Most of the training algorithms focus on weight values, activation functions, and network structures for providing optimal outputs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Vibrant search mechanism for numerical optimization functions by Shambour, Moh’d Khaled Yousef

    Published 2018
    “…Recently, various variants of evolutionary algorithms have been offered to optimize the exploration and exploitation abilities of the search mechanism.Some of these variants still suffer from slow convergence rates around the optimal solution. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Clustering Spatial Data Using a Kernel-Based Algorithm by Awan, A. Majid, Md. Sap, Mohd. Noor

    Published 2005
    “…Therefore, this work comes up with new clustering algorithm using kernel-based methods for effective and efficient data analysis by exploring structures in the data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A novel explanatory hybrid artificial bee colony algorithm for numerical function optimization by Jarrah, Muath Ibrahim, Mohamad Jaya, Abdul Syukor, Mohd Abid, Mohd Asyadi Azam, Alqattan, Zakaria N., Azam, Mohd Asyadi, Abdullah, Rosni, Jarrah, Hazim, Abu‑Khadrah, Ahmed Ismail

    Published 2020
    “…The aim is to improve the exploitation mechanism of the standard ABC. The proposed algorithm was experimentally tested with parameters tuning process and validated using selected benchmark functions with diferent characteristics, and it was also evaluated and compared with well-known state-of-the-art algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…Experimental results over the IEEE Congress on Evolutionary Computation (CEC) 2014 benchmark functions indicate that Opposition-based Simulated Kalman Filter (OBSKF) has made some improvement towards exploration capability of SKF, while the Current Optimum Opposition-based Simulated Kalman Filter (COOBSKF) improved the exploration capability of SKF significantly. …”
    Get full text
    Get full text
    Thesis