Search Results - (( java mean encryption algorithm ) OR ( using interactive optimization algorithm ))

Refine Results
  1. 1

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…A simple PIN code verlfication is no longer suflcient and would require a more complex and fools proof authentication method. A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B., Alsewari, Abdulrahman A.

    Published 2015
    “…Although useful, strategies based on the aforementioned optimization algorithms are not without limitation. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Whale optimization algorithm strategies for higher interaction strength t-way testing by Ali Abdullah, Hassan, Salwani, Abdullah, Kamal Z., Zamli, Rozilawati, Razali

    Published 2022
    “…To ensure that WOA conquers premature convergence and avoids local optima for large search spaces (owing to high-order interaction), three variants of WOA have been developed, namely Structurally Modified Whale Optimization Algorithm (SWOA), Tolerance Whale Optimization Algorithm (TWOA), and Tolerance Structurally Modified Whale Optimization Algorithm (TSWOA). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite by Suali, Anjila J., Nuraminah Ramli, Rozmie Razif Othman, Hasneeza Liza Zakaria, Iszaidy Ismail, Nor Shahida Mohd Jamail, Rimuljo Hendradi, Nurol Husna Che Rose

    Published 2025
    “…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Sequence t-way test generation using the barnacles mating optimizer algorithm by Kamal Z., Zamli, Kader, Md. Abdul

    Published 2021
    “…More precisely, we focus on the generation of test cases due to the ordering of inputs (or sequence) using the newly developed Barnacles Mating Optimizer (BMO) Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Interacted Multiple Ant Colonies for Search Stagnation Problem by Aljanabi, Alaa Ismael

    Published 2010
    “…This thesis addresses the issues associated with search stagnation problem that ACO algorithms suffer from. In particular, it proposes the use of multiple interacted ant colonies as a new algorithmic framework. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An experimental study of modified black hole algorithms by Mohammed, Suad Khairi

    Published 2018
    “…Benchmarking with particle swarm optimization (PSO), genetic algorithm (GA), and grey wolf optimizer (GWO) is done as well. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Effects of Different Superpixel Algorithms on Interactive Segmentations by Soo See, Chai, Luong Goh, Kok, Weng Ng, Giap, Muzaffar, Hamzah

    Published 2022
    “…As such, the key to achieving a decent segmentation result lies in choosing the right superpixel algorithms for a given interactive segmentation algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2019
    “…This is called hybrid artificial bee colony (HABC) strategy, which is based on hybridize of an artificial bee colony (ABC) algorithm with a particle swarm optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Article
  18. 18

    Analysis of the stagnation behavior of the interacted multiple ant colonies optimization framework by Aljanaby, Alaa, Ku-Mahamud, Ku Ruhana

    Published 2011
    “…Search Stagnation is a common problem that all Ant Colony Optimization (ACO) algorithms suffer from regardless of their application domain. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Application of conjugate gradient approach for nonlinear optimal control problem with model-reality differences by Leong, Wah June, Sie, Long Kek, Teo, Kok Lay, Sim, Sy Yi

    Published 2018
    “…In this paper, an efficient computational algorithm is proposed to solve the nonlinear optimal control problem. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Application of conjugate gradient approach for nonlinear optimal control problem with model-reality difference by Sie, Long Kek, Wah, June Leong, Sy, Yi Sim, Kok, Lay Teo

    Published 2018
    “…In this paper, an efficient computational algorithm is proposed to solve the nonlinear optimal control problem. …”
    Get full text
    Get full text
    Get full text
    Article