Search Results - (( java time encryption algorithm ) OR ( using code optimization algorithm ))
Search alternatives:
- code optimization »
- time encryption »
- using code »
- java »
-
1
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Particular input is read by the relevant Java program and the encryption time and secrecy are calculated and output on the screen. …”
Get full text
Get full text
Get full text
Thesis -
2
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. Encryption and decryption times measured between 5 and 27 m sec in 2 GHz Pentium and java platform so time variant and fast enough key generation had been kept collision and timing attacks away due to small seized storage. …”
Get full text
Get full text
Article -
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…By using the optimization min-sum belief propagation approach, a low complexity min-sum (MS) based decoding algorithm called Variable Global Optimization Min-Sum (VGOMS) has been developed. …”
Get full text
Get full text
Get full text
Thesis -
7
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Article -
8
Optimality of bus-invert coding
Published 2009“…To do so, we first represent the bus and invert line using a trellis diagram. Then, we show that applying bus-invert coding to a sequence of words gives the same result as would be obtained by using the Viterbi algorithm, which is known to be optimal. …”
Get full text
Get full text
Article -
9
Study of optimal EG placement in radial distribution system using real coded genetic algorithm
Published 2011“…The RCGA is used as a tool, which can determine the optimal location and size of EG in radial system concurrently. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
A Real-Coded Dynamic Genetic Algorithm For Optimizing Driver’s Model In Emission Test Cycle
Published 2015“…This paper proposes a real-coded Genetic Algorithm for finding optimal parameters’ values of a driver’s model. …”
Get full text
Get full text
Get full text
Article -
12
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
13
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
14
A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System
Published 2021“…Furthermore, high-performing Ant Colony Optimization (ACO) algorithms were used to optimize the travel path time. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…This work focuses on the optimization of the parallelization of a sequential code. …”
Get full text
Get full text
Research Report -
16
A new dynamic code assignment algorithm for joint CDMA and SDMA system
Published 2008“…This article describes an optimal dynamic code assignment algorithm, which can be used to maximize the total number of users in combined C-SDMA system with minimum required quality of service (QoS) and limited number of codes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA)
Published 2024“…Real-coded genetic algorithm (RCGA) as a stochastic global search method was applied for optimization. …”
Article -
19
A review of crossover methods and problem representation of genetic algorithm in recent engineering applications
Published 2020“…This paper reviews crossover methods and problem representation, e.g. in the form of binary coded and real coded representation, used by researchers in order to solve engineering operations. …”
Get full text
Get full text
Get full text
Article -
20
