Search Results - (( java automatic optimization algorithm ) OR ( using double encryption algorithm ))
Search alternatives:
- automatic optimization »
- double encryption »
- using double »
- java »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
2
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Under the control of the dynamic encryption step algorithm, it effectively destroys the correlation between the source image’s pixels. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
6
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…The proposed solution improves the performance of the standard ECC and outperforms the AES algorithm in terms of encryption speed and response time.…”
Get full text
Get full text
Thesis -
7
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…This descriptive-analytical was resolved using the formulation of the study such as point addition, point doubling and double-and-add algorithm. …”
Get full text
Get full text
Student Project -
8
Video encryption using computation between H.264/AVC and AES encryption algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
9
A new computation algorithm for a cryptosystem based on Lucas Functions
Published 2008“…The encryption process used a public key which was known publicly and the decryption used a private key which was known only by sender and receiver of the messages. …”
Get full text
Article -
10
Randomized text encryption: a new dimension in cryptography
Published 2014“…The proposed technique uses random numbers added to plaintext along with encryption key. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Improved scalar multiplication algorithm in affine coordinate system using elliptic net
Published 2022“…Thus, this study designed a new scalar multiplication algorithm using six blocks of the elliptic net in a double and double-add method that cost 12M+6S in each block. …”
Get full text
Get full text
Get full text
Article -
12
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The computation time analysis shows that whene doubling with remainder technique is used, the improvement of the speed rises rapidly compared to the standard implementation of the LUC algorithm and LUC algorithm with doubling rule. …”
Get full text
Get full text
Thesis -
13
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
14
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For high security, encryption is one of the methods used to protect data against leakage. …”
Get full text
Get full text
Get full text
Thesis -
15
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
Get full text
Get full text
Thesis -
16
-
17
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis
