Search Results - (( java automatic optimization algorithm ) OR ( using negative encryption algorithm ))
Search alternatives:
- automatic optimization »
- negative encryption »
- using negative »
- java »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
3
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
5
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
A secure, anonymous and verifiable E-Voting system
Published 2020“…Therefore, this paper studies the disadvantages of the existing voting system by looking through the method used by the society. Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
AN INTEGRATED TECHNIQUE IN ACHIEVING THE CONFIDENTIALITY, INTEGRITY AND ROBUSTNESS FOR BIG DATA TRANSMISSION
Published 2017“…Henceforth, this research addresses these security issues collectively without negatively affecting each other. It increases confidentiality and offers a backup for accidental data loss by combining Simplified Encryption Standard (SDES) and an advanced pattern generation technique which uses a unique pattern generation table. …”
Get full text
Get full text
Thesis
