Search Results - (( program planning optimization algorithm ) OR ( java based encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Path planning algorithm for a car like robot based on MILP method by Mohd Sadri, Mohd Pawzi

    Published 2013
    “…This project is presents an algorithm for path planning optimal routes mobile robot “like a car” to a target in unknown environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    A Constraint Programming-based Genetic Algorithm (CPGA) for Capacity Output Optimization by Ean, Kate Nee Goh, Jeng, Feng Chin, Wei, Ping Loh, Chea, Ling Tan

    Published 2014
    “…Purpose: The manuscript presents an investigation into a constraint programming-based genetic algorithm for capacity output optimization in a back-end semiconductor manufacturing company. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Urban connected vehicle lane planning based on improved Frank Wolfe algorithm by Anqi, Jiang, Faziawati, Abdul Aziz, Norsidah, Ujang, Mohd Afzan, Mohamed

    Published 2025
    “…The results showed that the accuracy and recall of the proposed improved whale optimization algorithm on the Iris dataset were 95.27% and 92.65%, respectively, which were superior to traditional whale optimization algorithm, moth flame optimization algorithm, moth flame optimization algorithm combined with chaos strategy, and adaptive firefly optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Urban connected vehicle lane planning based on improved Frank Wolfe algorithm by Jiang, Anqi, Abdul Aziz, Faziawati, Ujang, Norsidah, Mohamed, Mohd Afzan

    Published 2025
    “…The results showed that the accuracy and recall of the proposed improved whale optimization algorithm on the Iris dataset were 95.27% and 92.65%, respectively, which were superior to traditional whale optimization algorithm, moth flame optimization algorithm, moth flame optimization algorithm combined with chaos strategy, and adaptive firefly optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm by Machmudah A., Parman S., Abbasi A., Solihin M.I., Manan T.S.A., Beddu S., Ahmad A., Rasdi N.W.

    Published 2023
    “…Genetic algorithms; Heuristic algorithms; Industrial manipulators; Redundant manipulators; Robot programming; Angle boundaries; Cyclic property; Hyper redundant; Hyper-redundant manipulator; Local orientations; Metaheuristic optimization; Optimization algorithms; Orientation angles; Sustainable manufacturing; Whale optimization algorithm; Motion planning…”
    Article
  16. 16

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Two-stage strategic optimal planning of distributed generators and energy storage systems considering demand response program and network reconfiguration by Ba-swaimi S., Verayiah R., Ramachandaramurthy V.K., ALAhmad A.K., Padmanaban S.

    Published 2025
    “…This work presents a stochastic two-stage mixed-integer nonlinear programming (MINLP) optimization model for the long-term planning of a distribution system (DS) to improve renewable energy integration over a ten-year period. …”
    Article
  20. 20