Search Results - (( using permutation _ algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- using permutation »
- testing algorithm »
- java application »
-
1
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
2
New algorithm for listing all permutations
Published 2010“…The new algorithm has advantages over the other methods due to its simplicity and easy to use.…”
Get full text
Get full text
Get full text
Article -
3
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013“…LBlock uses word permutation to do the diffusion while this research uses bit permutation to increase the number of active Substitution box (S-box). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
New recursive circular algorithm for listing all permutations
Published 2014“…Linear array of permutations is hard to be factorised. However, by using a starter set, the process of listing the permutations becomes easy. …”
Get full text
Get full text
Get full text
Article -
5
New recursive circular algorithm for listing all permutations
Published 2014“…Linear array of permutations is hard to be factorized.However, by using a starter set, the process of listing the permutations becomes easy. …”
Get full text
Get full text
Get full text
Article -
6
Starter Set Generation Based on Factorial Numbers for Half Wing of Butterfly Representation
Published 2021“…This paper presents the use of factorial numbers for generating starter sets where starter sets are used for listing permutation. …”
Get full text
Get full text
Get full text
Article -
7
Comparison between starter sets generation method for listing all permutations
Published 2013“…Listing of all n! distinct permutations is an exhaustive process.Using starter set, the process of listing the permutations becomes easy.However a problem arises when the equivalence starter sets will generate the similar permutation and needed to be discarded.Two new recursive strategies are proposed to generate starter sets without generating equivalence starter sets namely circular and exchange two elements operation.Once the starter sets are obtained, the circular and reverse of circular operation are employed to produce distinct permutation from each starter sets.Computational advantages are presented comparing the results obtained by the new method with two other existing methods.The result indicates that the exchange two elements based strategy is faster than the circular based.Overall all new algorithms are better than existing algorithms in time execution.…”
Get full text
Get full text
Conference or Workshop Item -
8
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
Published 2005“…This algorithm is based on the combination of Fibonacci permutation and discrete wavelet transforms (DWT). …”
Get full text
Get full text
Thesis -
9
The division free parallel algorithm for finding determinant
Published 2013“…A cross multiplication method for determinant was generalized for any size of square matrices using a new permutation strategy.The permutation is generated based on starter sets.However, via permutation, the time execution of sequential algorithm became longer.Thus, in order to reduce the computation time, a parallel strategy was developed which is suited for master and slave paradigm of the high performance computer.A parallel algorithm is integrated with message passing interface.The numerical results showed that the parallel methods computed the determinants faster than the sequential counterparts particularly when the tasks were equally allocated.…”
Get full text
Get full text
Get full text
Article -
10
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…In this thesis, the Spiral Fibonacci is proposed for a permutation function to diffuse bit permutation in improving cryptography algorithm efficiency. …”
Get full text
Get full text
Thesis -
11
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To overcome these challenges, this paper proposes the DNA-Dynamic Concurrent Permutation-Diffusion Algorithm (DNA-DCP-DA), which introduces four advanced encryption mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
13
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
A new parallel model for starter sets generation via exchanging two elements
Published 2019“…Generating permutation can be done in many ways. One of them is via starter sets which are obtained using exchange operation strategy and exploit them to list down all permutations. …”
Get full text
Get full text
Article -
17
A crosstalk free routing algorithm of Generalized Recursive Non-blocking Network
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
18
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
Get full text
Thesis -
19
Isolated handwritten digit recognition using genetic algorithm / Farizatul Sarina Mohd Sari
Published 2007“…The data will be in a form of bitmap pictures with 16 x 16 images and 32 x 32 images. In the algorithm, two types of encoding scheme used that are binary encoding and permutation encoding. …”
Get full text
Thesis -
20
Crosstalk freeness of concatenated modified plus-minus 2i photonic switching network
Published 2014“…It is shown that using the proposed routing algorithm the CMPM2I network is capable of realizing semi-permutation in one pass and thus the whole network is corsstalk free in two passes.…”
Get full text
Get full text
Get full text
Proceeding Paper
