Search Results - (( process optimization techniques algorithm ) OR ( java applications security algorithm ))

Refine Results
  1. 1
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…Central to the goal of meeting this need is the issue of appropriate techniques for manufacturing process planning optimization in reconfigurable manufacturing, i.e. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    A holistic review on artificial intelligence techniques for well placement optimization problem by Islam, J., Vasant, P.M., Negash, B.M., Laruccia, M.B., Myint, M., Watada, J.

    Published 2020
    “…Newly developed optimization algorithms are very efficient and favorable when compared to other established optimization algorithms and in all cases, it has been noticed that hybridization of two or more algorithms works better than stand-alone algorithms. …”
    Get full text
    Get full text
    Article
  7. 7

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…In future, this work could be enhanced for better performances in both aspects using another variant of the PSO or other potential metaheuristic searching techniques such as Firefly Optimization, Bat Algorithm and etc.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed by Awang Ahmed, Rohana

    Published 2000
    “…There is also possibility that the design does not meet specification thus forcing the process to be repeated. This project describe how Genetic Algorithm (GA) could be used to optimize the process of designing analog filter by considering such as magnitude response. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…In its operation, the metaheuristic algorithm optimizes the feature selection process,which will later be processed using the classification algorithm.Three (3) meta-heuristics were implemented, namely Genetic Algorithm, Particle Swarm Optimization, and Cuckoo Search Algorithm; the experiment was conducted, and the results were collected and analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid by Abdul Hamid, Zulkifli

    Published 2013
    “…Contrary to conventional techniques which mainly rely on matrix operation, the proposed algorithm implements optimization technique as an alternative for performing the tracing process. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics by Mohammad Jarrah, Mu'ath Ibrahim

    Published 2018
    “…Optimization is a crucial process to select the best parameters in single and multi-objective problems for manufacturing process.However,it is difficult to find an optimization algorithm that obtain the global optimum for every optimization problem.Artificial Bees Colony (ABC) is a well-known swarm intelligence algorithm in solving optimization problems.It has noticeably shown better performance compared to the state-of-art algorithms.This study proposes a novel hybrid ABC algorithm with β-Hill Climbing (βHC) technique (ABC-βHC) in order to enhance the exploitation and exploration process of the ABC in optimizing carbon nanotubes (CNTs) characteristics.CNTs are widely used in electronic and mechanical products due to its fascinating material with extraordinary mechanical,thermal,physical and electrical properties. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Artificial intelligence technique in solving nano-process parameter optimization problem / Norlina Mohd Sabri...[et al.] by Mohd Sabri, Norlina, Puteh, Mazidah, Md Sin, Nor Diyana

    Published 2017
    “…The techniques are Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Gravitational Search Algorithm (GSA). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models by ul Islam, B., Baharudin, Z.

    Published 2017
    “…These models are developed by integrating multilayer perceptron neural network and evolutionary optimization techniques. Genetic algorithm and simulated annealing techniques are used to optimize the control parameters of the neural network. …”
    Get full text
    Get full text
    Article
  20. 20

    Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman by Isman, Muhammad Iskandar

    Published 2017
    “…ACO algorithm is the best solution because it included the optimization technique to optimized the result based on the data criteria needs. …”
    Get full text
    Get full text
    Thesis