Search Results - (( programmes using optimization algorithm ) OR ( java data protection algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Investigation and validation of an eleven level symmetric modular multilevel inverter using grey wolf optimization and differential evolution control algorithm for solar PV applica... by Stonier, A.A., Chinnaraj, G., Kannan, R., Mani, G.

    Published 2021
    “…Purpose: This paper aims to examine the design and control of a symmetric multilevel inverter (MLI) using grey wolf optimization and differential evolution algorithms. …”
    Get full text
    Get full text
    Article
  8. 8

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm by Mohamad Zunnurain Fauzi

    Published 2023
    “…There are many methods that can be used for power losses minimization such as Firefly Algorithm (FA), Ant Colony Optimization (ACO) and B-losses coefficient. …”
    text::Final Year Project
  11. 11

    Malaysia residential load profile management based on time of use tariff using ant colony optimization algorithm by Dahlan, Nofri Yenita, Sulaima, Mohamad Fani, Wan Hanapi, Wan Noor Azzyati, Noor Din, Muhamad Muhtazam

    Published 2022
    “…For those reasons, the government has introduced Demand Side Management (DSM) as a programme to promote balanced energy use between energy generation and demand. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array by Alkhafaji, Falih Salih

    Published 2019
    “…There are many researches have been done to optimize PI controller based evolutionary algorithm, such as Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi by Muniyandi, Chandren, Maroosi, Ali

    Published 2015
    “…TRAKLA2 is a visualisation tool used to enhance the process of learning algorithm construction and optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Design of field programmable gate array-based proportional-integral-derivative fuzzy logic controller with tunable ganin by Obaid, Zeyad Assi

    Published 2010
    “…This block involves a tuning via scaling the universe of discourse and is able to accept optimal scaling gains. The particle swarm optimization method (PSO) is used to obtain the optimal values of these gains. …”
    Get full text
    Get full text
    Thesis
  17. 17

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Design of DNA sequence alignment accelerated system using 2-dimensional array and custom instruction on FPGA / Nur Dalilah Ahmad Sabri by Ahmad Sabri, Nur Dalilah

    Published 2018
    “…The proposed 2D Array on SW algorithm has been developed and designed by using ideas over previous work of CI on SW algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using asic design flow: article / Nurzaima Mahmod by Mahmod, Nurzaima

    “…In the advanced engineering technology, the massive parallelism can be implemented by using the Field Programmable Logic Array (FPGA) techniques. …”
    Get full text
    Get full text
    Article
  20. 20

    Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes by Mohammad Sigit Arifianto, Tze, Kenneth Kin Teo, Liau, Chung Fan, Liawas Barukang, Zaturrawiah Ali Omar

    Published 2007
    “…In order to have a realistic characteristic of a parallel computing engine, a Rocks based computer cluster was built and used for the test. Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
    Get full text
    Get full text
    Research Report