Search Results - (( parameter evaluation path algorithm ) OR ( java applications security algorithm ))
Search alternatives:
- parameter evaluation »
- java applications »
- evaluation path »
- path algorithm »
-
1
-
2
Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin
Published 2010“…Performances between both algorithms were compared and evaluated in terms of speed and number of iterations that each algorithm takes to find an optimal path within several selected environments. …”
Get full text
Get full text
Get full text
Article -
3
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…Sampling-based motion planning is a class of randomized path planning algorithms with proven completeness. …”
Get full text
Get full text
Thesis -
4
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Subjects:Conference Paper -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
A multi-objective parametric algorithm for sensor-based navigation in uncharted terrains
Published 2023“…These parameters are designed carefully to cover different requirements of the path planner. …”
Article -
7
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…Subsequently, both algorithms were applied to the test environments. Finally, the performances of both algorithms were analyzed and evaluated based on the required criteria. …”
Get full text
Get full text
Thesis -
8
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
9
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…The objectives of this study are to explore and evaluate the Ant System (AS) algorithm and Ant Colony System (ACS) algorithm in finding shortest paths. …”
Get full text
Get full text
Get full text
Thesis -
10
Performance analysis of ZigBeePRO network using shortest path algorithm for Distributed Renewable Generation
Published 2021“…Due to this polarization effect, the brick-built type cabin at the DRG site is a consequence of a higher propagation path loss than the Iron (III)-made cabin. The other performance parameters, including network throughput, data loss, and ZigBeePRO collision, are also evaluated.…”
Get full text
Get full text
Article -
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
12
All-pass filtered x least mean square algorithm for narrowband active noise control
Published 2018“…The performance evaluation in terms of convergence speed of the proposed algorithm is validated with standard ANC without secondary path modelling. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
14
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
15
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
Get full text
Get full text
Article -
16
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
Get full text
Get full text
Article -
17
Transmission path optimization Based on Efficiency Communication System
Published 2022“…At the same time, the developed algorithm combines the relative position of the cluster and the base station to further improve the routing method of the sub-cluster head, Finally, the algorithm analyzes the influence of different parameters on the transmission path, and use the simulation experiments to evaluate the conclusions.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
19
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
20
Secure scheme for user authentication and authorization in android environment
Published 2013“…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
Get full text
Get full text
Get full text
Article
