Search Results - (( java application optimisation algorithm ) OR ( using key problems algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- key problems »
- using key »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The research works were implemented by simulation in which it was used to identify the selection problem, implementation of the proposed algorithms and the measurement of the results. …”
Get full text
Get full text
Thesis -
3
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The first algorithm determines an approach of performing key exchanges between two subgroups for Decomposition Problem and three subgroups for Triple Decomposition Problem. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. …”
Get full text
Get full text
Article -
5
Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems
Published 2014“…The comparison of the result of the developed integrated algorithm using two benchmark FMS scheduling algorithms datasets is conducted. …”
Get full text
Get full text
Thesis -
6
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
Get full text
Get full text
Thesis -
7
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
8
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…VoIP is usually used by public users resulting in a key exchange problem and a trusted intermediate authority normally takes this responsibility. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
10
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
Published 2011“…An algorithm proposed for involutory key matrix generation is also implemented in the proposedalgorithm. …”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
A Micro-Genetic Algorithm Approach for Soft Constraint Satisfaction Problem in University Course Scheduling
Published 2013“…In addition, the design of course timetables for universities is a very difficult task because it is a non-deterministic polynomial, (NP) hard problem. This problem can be minimized by using a Micro Genetic Algorithm approach. …”
Get full text
Get full text
Get full text
Thesis -
14
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
15
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
16
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
18
Conflict-free automated guided vehicles routing using multi-objective genetic algorithm
Published 2013“…The problem is represented using one sub-chromosome for dispatching represented with random keys and the remaining sub-chromosomes for routing represented with priority-based encoding. …”
Get full text
Get full text
Get full text
Article -
19
A new public key cryptosystem based on IFS
Published 2010“…To encrypt the plaintext with the receiver's public key we use one of the key agreement protocols to generate a shared private key that used to find the attractor of the IFS. …”
Get full text
Get full text
Get full text
Article -
20
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…Throughout this research, a new algorithm from NIST that is Advance Encryption Standard (AES) is found can be used in IPSec to overcome these problems. …”
Get full text
Get full text
Conference or Workshop Item
