Search Results - (( simulation optimization tree algorithm ) OR ( java applications security algorithm ))
Search alternatives:
- optimization tree »
- java applications »
- tree algorithm »
-
1
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
-
3
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The simulation of planting lining design relative to possible solutions of dividing an area to blocks (block division) and selecting planting lining direction towards optimizing tree planting areas is a complex problem. …”
Get full text
Get full text
Thesis -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…This study proposed an enhanced algorithm called hellingerant-tree-miner (HATM) which is inspired by ant colony optimization (ACO) metaheuristic for imbalanced learning using decision tree classification algorithm. …”
Get full text
Get full text
Get full text
Article -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
7
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…This study systematically examined recent research trends in multi-objective optimization (MOO) for building performance from 2020 to 2024 and proposed a conceptual framework integrating intelligent algorithms, simulation tools, and climate adaptation strategies. …”
Get full text
Get full text
Get full text
Article -
8
Online PID controller tuning using tree physiology optimization
Published 2017“…This iterative correlation leads towards optimum solution. A simulation of online PID-tuning is applied to demonstrate the effectiveness of proposed algorithm and compared with other optimization method which are Particle Swarm Optimization (PSO) and Ziegler-Nichols (Z-N) method. © 2016 IEEE.…”
Get full text
Get full text
Article -
9
An Intelligent Data-Driven Approach for Electrical Energy Load Management Using Machine Learning Algorithms
Published 2022“…In this research work, an exhaustive parametric and empirical comparative study is conducted on the SEIL dataset for the recommendation of the optimal machine learning algorithm. The simulation results established the findings that Bagged Trees, Fine Trees, and Medium Trees are, respectively, the best-, second-best-, and third-best-performing algorithms in terms of efficacy. …”
Get full text
Get full text
Get full text
Article -
10
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…This paper presents the tuning of PID controller for single-input single-output (SISO) and multiple-input multiple-output (MIMO) control systems using tree physiology optimization (TPO). TPO is a metaheuristic algorithm inspired from a plant growth system derived based on the idea of plant architecture and Thornley model (TM). …”
Get full text
Get full text
Article -
11
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…This paper presents the tuning of PID controller for single-input single-output (SISO) and multiple-input multiple-output (MIMO) control systems using tree physiology optimization (TPO). TPO is a metaheuristic algorithm inspired from a plant growth system derived based on the idea of plant architecture and Thornley model (TM). …”
Get full text
Get full text
Article -
12
-
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
14
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…Firstly, the kinematics and dynamic model of the vehicle are implemented. Secondly, the RRT algorithm and the A-star algorithm are expounded, and the idea of the A-star algorithm is applied to the RRT algorithm for improvement. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
15
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…Developing an exploration algorithm based on spanning tree is the main contribution. …”
Get full text
Get full text
Thesis -
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
17
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
18
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
19
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
20
Secure scheme for user authentication and authorization in android environment
Published 2013“…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
Get full text
Get full text
Get full text
Article
