Search Results - (( java applications security algorithm ) OR ( data optimisation system algorithm ))
Search alternatives:
- optimisation system »
- java applications »
- data optimisation »
- system algorithm »
-
1
-
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
5
Optimising a waste management system using the Artificial Bee Colony (ABC) algorithm
Published 2025“…Overall, the proposed approach shows promise in enhancing the efficiency and responsiveness of real-world waste collection systems. Future work may focus on integrating real-time data, adjusting algorithm parameters and hybridizing ABC algorithm with other metaheuristics to further improve performance.…”
Get full text
Get full text
Student Project -
6
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025“…This project proposes and evaluates three bio-inspired and evolutionary algorithms for VM allocation and migration: Ant Colony Optimisation (ACO), Particle Swarm Optimisation (PSO), and a Modified Genetic Algorithm (MGA). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Performance evaluation of load balancing algorithm for virtual machine in data centre in cloud computing
Published 2018“…Cloud computing has become biggest buzz in the computer era these days.It runs entire operating systems on the cloud and doeverything on cloud to store data off-site.Cloud computing is primarily based on grid computing, but it’s a new computational model.Cloud computing has emerged into a new opportunity to further enhance way of hosting data centre and provide services.The primary substance of cloud computing is to deal the computing power,storage,different sort of stages and services which assigned tothe external users on demand through the internet.Task scheduling in cloud computing is vital role optimisation and effective dynamic resource allocation for load balancing.In cloud, the issue focused is under utilisation and over utilisation of the resources to distribute workload of multiple network links for example,when cloud clients try to access and send request tothe same cloud server while the other cloud server remain idle at that moment, leads to the unbalanced of workload on cloud data centers.Thus, load balancing is to assign tasks to the individual cloud data centers of the shared system so that no single cloud data centers is overloaded or under loaded.A Hybrid approach of Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm is combined in order to get effective response time.The proposed hybrid algorithm has been experimented by using CloudSim simulator.The result shows that the hybrid load balancing algorithm improves the cloud system performance by reducing the response time compared to the Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm.…”
Get full text
Get full text
Get full text
Article -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
11
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
12
Evolvable traffic signal control for intersection congestion alleviation with enhanced particle swarm optimisation
Published 2017“…This work simulates traffic system and develop an optimising algorithm to instruct the traffic signal timing plan. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
13
-
14
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
15
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
16
INTELLIGENT MODELLING OF GRADIENT FLEXIBLE PLATE STRUCTURE UTILISING HYBRID EVOLUTIONARY ALGORITHM
Published 2023“…A slanted GFPS with orientation angle of 30° and all edges clamped was developed and fabricated to represent the actual dynamics of the system. Then, data acquisition and instrumentation system were integrated to the rig to collect the input-output vibration data. …”
Get full text
Get full text
Thesis -
17
Secure scheme for user authentication and authorization in android environment
Published 2013“…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
Get full text
Get full text
Get full text
Article -
18
-
19
NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali
Published 2019“…This study proposes a system identification of SDPP using NARX model. The model structure selection of polynomial NARX had been focused on Binary Particle Swarm Optimisation (BPSO) algorithm. …”
Get full text
Get full text
Thesis -
20
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item
