Search Results - (( java simulation optimization algorithm ) OR ( using e encryption algorithm ))

Refine Results
  1. 1

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images by Ting, Kung Chuang

    Published 2022
    “…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…ECC can be perfonn by using either finite field or binary field. Text encryption using ECC over bina1y finite ticld, G/(2"' ) has more advantage than Ctnitc field, Gf(p) but the previous study that use ECC and EIGamal for text encryption only represent the system using Gf(p). …”
    Get full text
    Get full text
    Student Project
  10. 10

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Chaos-based simultaneous compression and encryption for Hadoop by Usama, M., Zakaria, N.

    Published 2017
    “…Numerous data compression and encryption tools are presently available on such platforms and the tools are characteristically applied in sequence, i.e., compression followed by encryption or encryption followed by compression. …”
    Get full text
    Get full text
    Article
  20. 20