Search Results - (( simulation optimization practice algorithm ) OR ( java applications security algorithm ))
Search alternatives:
- optimization practice »
- practice algorithm »
- java applications »
-
1
-
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
4
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In this research, two novel estimation-based metaheuristic optimization algorithms, named as Simulated Kalman Filter (SKF), and single-solution Simulated Kalman Filter (ssSKF) algorithms are introduced for global optimization problems. …”
Get full text
Get full text
Thesis -
5
A discrete simulated kalman filter optimizer for combinatorial optimization problems
Published 2022“…However, these extensions may result in increased execution times for the algorithm. In this research, a new combinatorial algorithm named discrete simulated Kalman filter optimizer (DSKFO) is proposed to solve combinatorial optimization problem. …”
Get full text
Get full text
Thesis -
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
8
Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA)
Published 2008“…This paper aims to demonstrate the effectiveness of Multi- Objective Genetic Algorithm Optimization and its robust practical application on the automobile engine valve timing where the variation of performance parameters required for finest tuning to obtain the optimal engine performances. …”
Get full text
Get full text
Proceeding Paper -
9
-
10
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
11
Hybridizing Invasive Weed Optimization with Firefly Algorithm for Unconstrained and Constrained Optimization Problems
Published 2017“…This study presents a hybrid invasive weed firefly optimization (HIWFO) algorithm for global optimization problems. …”
Get full text
Get full text
Get full text
Article -
12
Optimized PV-Battery Systems using Backtracking Search Algorithm for Sustainable Energy Solutions
Published 2024“…Real-world energy demand and weather data are integrated for practical relevance. Rigorous simulations within MATLAB/Simulink establish a robust analytical framework, evaluating optimization algorithms and identifying optimal configurations. …”
Conference Paper -
13
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…This study systematically examined recent research trends in multi-objective optimization (MOO) for building performance from 2020 to 2024 and proposed a conceptual framework integrating intelligent algorithms, simulation tools, and climate adaptation strategies. …”
Get full text
Get full text
Get full text
Article -
14
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
15
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
16
Secure scheme for user authentication and authorization in android environment
Published 2013“…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
Get full text
Get full text
Get full text
Article -
17
Application of Multi-objective Genetic Algorithm (MOGA) for design optimization of valve timing at various engine speeds
Published 2011“…This paper aims to demonstrate the effectiveness of Multi-Objective Genetic Algorithm Optimization and its practical application on the automobile engine valve timing where the variation of performance parameters required for finest tuning to obtain the optimal engine performances. …”
Get full text
Get full text
Get full text
Article -
18
Revolutionizing crowd safety: A breakthrough hybrid whale-bat chaotic algorithm (WOABCM) for optimized evacuation simulations
Published 2024“…This groundbreaking approach to crowd evacuation simulation demonstrates how chaos theory-inspired algorithms can be used to solve practical problems.…”
Get full text
Get full text
Get full text
Get full text
Article -
19
Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots
Published 2006“…As a result, this study has thus shown that the multi-objective approach to evolutionary robotics in the form of the elitist PDE-EMO algorithm can be practically used to automatically generate controllers for RF-Iocalization behavior in autonomous mobile robots.…”
Get full text
Get full text
Research Report -
20
A high-performance democratic political algorithm for solving multi-objective optimal power flow problem
Published 2025“…The proposed approach is tested and validated on IEEE 57-bus and IEEE 118-bus systems with different case studies. Simulation results are analyzed and compared with two popular and commonly used multi-objective-evolutionary algorithms namely, non-dominated sorting genetic algorithm II (NSGA-II) and the multi-objective particle swarm optimization (MOPSO) on the problem. …”
Article
