Search Results - (( java effective encryption algorithm ) OR ( using interactive optimization algorithm ))
Search alternatives:
- java »
- interactive »
-
1
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
2
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
A comparative study on testing optimization techniques with combinatorial interaction testing for optimizing software product line testing
Published 2025“…Results show the best optimization algorithm is the Genetic Algorithm and the optimum interaction strength is t=5. …”
Get full text
Get full text
Get full text
Article -
5
On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing
Published 2015“…Although useful, strategies based on the aforementioned optimization algorithms are not without limitation. …”
Get full text
Get full text
Get full text
Article -
6
Whale optimization algorithm strategies for higher interaction strength t-way testing
Published 2022“…To ensure that WOA conquers premature convergence and avoids local optima for large search spaces (owing to high-order interaction), three variants of WOA have been developed, namely Structurally Modified Whale Optimization Algorithm (SWOA), Tolerance Whale Optimization Algorithm (TWOA), and Tolerance Structurally Modified Whale Optimization Algorithm (TSWOA). …”
Get full text
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
8
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
Get full text
Get full text
Get full text
Article -
9
Sequence t-way test generation using the barnacles mating optimizer algorithm
Published 2021“…More precisely, we focus on the generation of test cases due to the ordering of inputs (or sequence) using the newly developed Barnacles Mating Optimizer (BMO) Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
An exploration technique for the interacted multiple ant colonies optimization framework
Published 2024Conference Paper -
11
Interacted Multiple Ant Colonies for Search Stagnation Problem
Published 2010“…This thesis addresses the issues associated with search stagnation problem that ACO algorithms suffer from. In particular, it proposes the use of multiple interacted ant colonies as a new algorithmic framework. …”
Get full text
Get full text
Get full text
Thesis -
12
An experimental study of modified black hole algorithms
Published 2018“…Benchmarking with particle swarm optimization (PSO), genetic algorithm (GA), and grey wolf optimizer (GWO) is done as well. …”
Get full text
Get full text
Get full text
Thesis -
13
TBat: A Novel Strategy for Minimization of T-Way Interaction Test Suite Based on the Particle Swarm Optimization and the Bat Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
14
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
Effects of Different Superpixel Algorithms on Interactive Segmentations
Published 2022“…As such, the key to achieving a decent segmentation result lies in choosing the right superpixel algorithms for a given interactive segmentation algorithm.…”
Get full text
Get full text
Get full text
Article -
16
-
17
Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation
Published 2019“…This is called hybrid artificial bee colony (HABC) strategy, which is based on hybridize of an artificial bee colony (ABC) algorithm with a particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
18
Analysis of the stagnation behavior of the interacted multiple ant colonies optimization framework
Published 2011“…Search Stagnation is a common problem that all Ant Colony Optimization (ACO) algorithms suffer from regardless of their application domain. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Application of conjugate gradient approach for nonlinear optimal control problem with model-reality differences
Published 2018“…In this paper, an efficient computational algorithm is proposed to solve the nonlinear optimal control problem. …”
Get full text
Get full text
Get full text
Article -
20
Application of conjugate gradient approach for nonlinear optimal control problem with model-reality difference
Published 2018“…In this paper, an efficient computational algorithm is proposed to solve the nonlinear optimal control problem. …”
Get full text
Get full text
Get full text
Article
