Search Results - (( java applications security algorithm ) OR ( sequence optimisation based algorithm ))
Search alternatives:
- sequence optimisation »
- optimisation based »
- java applications »
-
1
Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm
Published 2019“…For optimisation purpose, this research proposed a relatively new algorithm called the Moth-Flame Optimisation (MFO). …”
Get full text
Get full text
Thesis -
2
Intergrated multi-objective optimisation of assembly sequence planning and assembly line balancing using particle swarm optimisation
Published 2013“…The aim of this research is to establish a methodology and algorithm for integrating ASP and ALB optimisation using Particle Swarm Optimisation. …”
Get full text
Get full text
Thesis -
3
An elitist-flower pollination-based strategy for constructing sequence and sequence-less t-way test suite
Published 2018“…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. In line with such a need, this paper presents a unified strategy based on the new meta-heuristic algorithm, called the elitist flower pollination algorithm (eFPA), for sequence and sequence-less coverage. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Performance evaluation and benchmarking of an extended computational model of ant colony system for DNA sequence design
Published 2014“…In literature, ACS has been employed to solve DNA sequence design problem. The DNA sequence design problem was modelled based on a finite state machine in which the nodes represent the DNA bases {A, C, T, G}. …”
Get full text
Get full text
Get full text
Article -
6
An improved particle swarm optimization algorithm for data classification
Published 2023“…Particle Swarm Optimization (PSO) is a metaheuristic algorithm based on swarm intelligence, widely used to solve global optimisation problems throughout the real world. …”
Get full text
Get full text
Get full text
Article -
7
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…Particle Swarm Optimisation (PSO) was selected as the base algorithm that needs improvement and integration with other techniques. …”
Get full text
Get full text
Book Section -
8
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
10
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Particle Swarm Optimisation (PSG) was selected as the base algorithm that needs improvement and integration with other techniques. …”
Get full text
Get full text
Thesis -
12
A Study of the Contribution of Nearest-Neighbour Thermodynamic Parameters to the DNA Sequences Generated by Ant Colony Optimisation
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
15
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
16
NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali
Published 2019“…The model structure selection of polynomial NARX had been focused on Binary Particle Swarm Optimisation (BPSO) algorithm. The proposed NARX-based BPSO algorithm was implemented for both time-varying water and steam temperature from the SDPP. …”
Get full text
Get full text
Thesis -
17
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
18
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
19
Secure scheme for user authentication and authorization in android environment
Published 2013“…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
Get full text
Get full text
Get full text
Article -
20
