Search Results - (( programming sequence optimization algorithm ) OR ( java mean encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A filtering algorithm for efficient retrieving of DNA sequence by Abdul Rahman, Mohd Nordin, Mohd. Saman, Md. Yazid, Ahmad, Aziz, Md. Tap, Abu Osman

    Published 2009
    “…The algorithm filtered the expected irrelevant DNA sequences in database from being computed for dynamic programming based optimal alignment process. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…A simple PIN code verlfication is no longer suflcient and would require a more complex and fools proof authentication method. A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    A guided dynamic programming approach for DNA sequence similarity search by Mohd Nordin Abdul Rahman

    Published 2011
    “…Similarity search procedure is executed by an alignment process between query and targeted sequences. An optimal alignment process based on the dynamic programming algorithms has shown to have 0(n x m) time and space complexity. …”
    Get full text
    Thesis
  6. 6
  7. 7

    Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment by Kesavan Prabagaran, Premkumar

    Published 2017
    “…The failing algorithm sequence of the units have been logged into database and analyzed for algorithm trimming. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An optimized test case generation technique for enhancing state-sensitivity partitioning by Sultan, Ammar Mohammed Dawood

    Published 2017
    “…The scope of this work is testing a module with memory where each module may consist of several programs. The essence of enSSP is to combine the features of Genetic Algorithm (GA) with a suite reduction technique to achieve optimization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Potential of data minimization techniques approach in improving DNA sequences alignment and comparison / Syed Abdul Mutalib Al Junid … [et al.] by Al Junid, Syed Abdul Mutalib, Haron, Muhammad Adib, Abd Majid, Zulkifli, Othman, Zulkifli

    Published 2012
    “…This study will initially involve algorithm modification, mathematical formulation, logic design and simulation for data minimization and existing DNA sequences alignment algorithm. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of intelligence based genetic algorithm for job sequencing problem on parallel mixed-model assembly line by Noroziroshan, Alireza, Mohd Ariffin, Mohd Khairol Anuar, Ismail, Napsiah

    Published 2010
    “…Then, it started to find the best sequence of jobs for each line based on the generated population by heuristic algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    New completion time algorithms for sequence based scheduling in multiproduct batch processes using matrix by Shafeeq , A., M.I., Abdul Mutalib, Amminudin , K.A., Muhammad , A.

    Published 2008
    “…These models require good understanding in formulating the problem using programming techniques to find the optimal solution. …”
    Get full text
    Get full text
    Article
  13. 13

    Filtered Distance Matrix For Constructing High-Throughput Multiple Sequence Alignment On Protein Data by Mohammad Abu-Hashem, Muhannad Abdul-Qader

    Published 2015
    “…Optimal MSA is an NP-hard problem, while building optimal alignment using dynamic programming is an NP complete problem. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Network reconfiguration and DG sizing incorporating optimal switching sequence for system improvement / Ola Subhi Waheed Badran by Ola Subhi , Waheed Badran

    Published 2018
    “…The proposed network reconfiguration also considered load profiles, DG output generation, DG types, and DG operating mode to decrease the total daily power loss. The chosen optimization techniques in this work include evolutionary programming (EP), particle swarm optimization (PSO), gravitational Search Algorithm (GSA), and firefly algorithm (FA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Economical optimization of conductor selection in planning radial distribution networks by Islam, S.J., Ghani, M.R.A.

    Published 1999
    “…A new computer algorithm and program is presented for selection of optimal conductor type and size for each feeder segment. …”
    Get full text
    Get full text
    Article