Search Results - (( simulation optimization practices algorithm ) OR ( java applications security algorithm ))

Refine Results
  1. 1
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…In this research, two novel estimation-based metaheuristic optimization algorithms, named as Simulated Kalman Filter (SKF), and single-solution Simulated Kalman Filter (ssSKF) algorithms are introduced for global optimization problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A discrete simulated kalman filter optimizer for combinatorial optimization problems by Suhazri Amrin, Rahmad

    Published 2022
    “…However, these extensions may result in increased execution times for the algorithm. In this research, a new combinatorial algorithm named discrete simulated Kalman filter optimizer (DSKFO) is proposed to solve combinatorial optimization problem. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA) by Mohiuddin, A. K. M., Ashour, Ahmed Aly Ibrahim Shaaban, Yap, Haw Shin

    Published 2008
    “…This paper aims to demonstrate the effectiveness of Multi- Objective Genetic Algorithm Optimization and its robust practical application on the automobile engine valve timing where the variation of performance parameters required for finest tuning to obtain the optimal engine performances. …”
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10
  11. 11

    Hybridizing Invasive Weed Optimization with Firefly Algorithm for Unconstrained and Constrained Optimization Problems by Hyreil A., Kasdirin, N. M., Yahya, M. S. M., Aras, Tokhi, M. O.

    Published 2017
    “…This study presents a hybrid invasive weed firefly optimization (HIWFO) algorithm for global optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Optimized PV-Battery Systems using Backtracking Search Algorithm for Sustainable Energy Solutions by Abdolrasol M.G.M., Jern Ker P., Hannan M.A., Tiong S.K., Ayob A., Almadani J.F.S.

    Published 2024
    “…Real-world energy demand and weather data are integrated for practical relevance. Rigorous simulations within MATLAB/Simulink establish a robust analytical framework, evaluating optimization algorithms and identifying optimal configurations. …”
    Conference Paper
  13. 13

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…This study systematically examined recent research trends in multi-objective optimization (MOO) for building performance from 2020 to 2024 and proposed a conceptual framework integrating intelligent algorithms, simulation tools, and climate adaptation strategies. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Application of Multi-objective Genetic Algorithm (MOGA) for design optimization of valve timing at various engine speeds by Mohiuddin, A. K. M., Rahman, Mohammed Ataur, Haw Shin, Yap

    Published 2011
    “…This paper aims to demonstrate the effectiveness of Multi-Objective Genetic Algorithm Optimization and its practical application on the automobile engine valve timing where the variation of performance parameters required for finest tuning to obtain the optimal engine performances. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Revolutionizing crowd safety: A breakthrough hybrid whale-bat chaotic algorithm (WOABCM) for optimized evacuation simulations by Hamizan, Sharbini, Mohamad Shukor, Talib, Noorfa Haszlinna, Mustaffa, Habibollah, Haron

    Published 2024
    “…This groundbreaking approach to crowd evacuation simulation demonstrates how chaos theory-inspired algorithms can be used to solve practical problems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots by Hanafi Ahmad Hijazi, Patricia Anthony

    Published 2006
    “…As a result, this study has thus shown that the multi-objective approach to evolutionary robotics in the form of the elitist PDE-EMO algorithm can be practically used to automatically generate controllers for RF-Iocalization behavior in autonomous mobile robots.…”
    Get full text
    Get full text
    Research Report
  20. 20

    A high-performance democratic political algorithm for solving multi-objective optimal power flow problem by Ahmadipour M., Ali Z., Othman M.M., Bo R., Javadi M.S., Ridha H.M., Alrifaey M.

    Published 2025
    “…The proposed approach is tested and validated on IEEE 57-bus and IEEE 118-bus systems with different case studies. Simulation results are analyzed and compared with two popular and commonly used multi-objective-evolutionary algorithms namely, non-dominated sorting genetic algorithm II (NSGA-II) and the multi-objective particle swarm optimization (MOPSO) on the problem. …”
    Article