Search Results - (( java application during algorithm ) OR ( using message optimization algorithm ))

Refine Results
  1. 1

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Thesis
  2. 2

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each eight sub keys, so if the text message less than 128 8-bit then use another sub key. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Enhancing Market-Based Scheduling Algorithm on Globally Distributed Web Servers Using Least Suitable Sealed Bid Technique by Al-Ewiwi, Mahmoud

    Published 2006
    “…These agents work cooperatively with each other through the Internet using message exchanging.An improved algorithm was implemented to decrease the amount of message exchanging between agents, which increased the performance of the system.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm by Li, Man, Liu, Fang, Abdullah, Zulhamri

    Published 2024
    “…Third, this work uses IPSO to optimize the initial network parameters of 1DCNN to build IPSO-1DCNN. …”
    Get full text
    Get full text
    Article
  5. 5

    An improved simulated annealing algorithm to avoid crosstalk in optical omega network by Abdullah, Monir, Othman, Mohamed, Johari, Rozita

    Published 2006
    “…It is a good idea to use these two algorithms to improve the performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network by Mumtazimah, Mohamad, Engku Fadzli Hasan, Syed Abdullah, Ghaleb, S.A.A., Ghanem, W.A.H.M.

    Published 2021
    “…The main idea of this research is to train a neural network by leveraging a new nature-inspired metaheuristic algorithm referred to as a Grasshopper Optimization Algorithm (GOA) to categorize emails as ham and spam. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Vehicle communications: Sensitive node election SNE algorithm achieves optimized QoS by Ayoob, Ayoob A., Mohd Faizal, Ab Razak, Khalil, Ghaith, Aksoy, Muammer

    Published 2026
    “…This paper presents a Sensitive Node Election (SNE) algo- rithm adapted to routing protocols in certain opportunistic network environments. The algorithm focuses on selecting the best agent for communication using an innovative approach for message forwarding. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin by Mohd Aminnuddin, Farabi Aizat

    Published 2019
    “…This research used Least Significant Bits (LSB) as the algorithm to embed the messages. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An efficient network mobility management for a 6LoWPAN mobile network in hospital environments by Shahamabadi, Mohammadreza Sahebi

    Published 2017
    “…Then, by using the proposed message-scheduling algorithm, end-to-end delay in NEMO-HWSN is reduced by approximately 20%. …”
    Get full text
    Get full text
    Thesis
  11. 11

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Faulty processes may cause some other active processes to become inactive during the queuing or within the using a critical section time. In addition, the system requires adding some messages to avoid starvation and deadlock. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A novel and high capacity audio steganography algorithm based on adaptive data embedding positions by Shahadi H.I., Jidin R., Way W.H.

    Published 2023
    “…This process help to provide optimal locations to hide the message blocks. These locations are considered as a stego-key that is ciphered and hided within the final detail sub-band which is specified for this purpose. …”
    Article
  14. 14

    Benchmarking routing algorithms in NoC-based MPSoCs using guaranteed convergence arithmetic optimization with artificial neural networks and fuzzy MCDM by R Muhsin, Al-Molla Yousif

    Published 2024
    “…The methodology includes two phases; phase 1 includes developing a prediction model, specifically an ANN optimized using the Guaranteed Convergence Arithmetic Optimization Algorithm (GCAOA-ANN). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Routing problem in rectangular mesh network using shortest path based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2019
    “…Each of these pins is connected to each other through networks and passes message using a standard message passing mechanism such as Message Passing Interface. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Routing problem in rectangular mesh network using Dijkstra’s based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2018
    “…Each of these pins is connected to each other through networks and passes message using a standard message passing mechanism such as Message Passing Interface. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…Each of these nodes is connected to each other through interconnection networks and passes message using a standard message passing mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A new particle swarm optimization for wireless mesh routing protocol by Abd. Rahman, Tharek

    Published 2008
    “…MPRs are used to flood control messages from a node into the network while reducing the number of retransmissions that will occur in a region. …”
    Get full text
    Monograph
  20. 20

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
    Article