Search Results - (( java applications security algorithm ) OR ( global optimization method algorithm ))
Search alternatives:
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. …”
Get full text
Get full text
Thesis -
2
-
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
5
A Hybrid Method Based on Cuckoo Search Algorithm for Global Optimization Problems
Published 2018“…However, it undergoes the premature convergence problem for high dimensional problems because the algorithm converges rapidly. Therefore, we proposed a robust approach to solve this issue by hybridizing optimization algorithm, which is a combination of Cuckoo search algorithm and Hill climbing called CSAHC discovers many local optimum traps by using local and global searches, although the local search method is trapped at the local minimum point. …”
Get full text
Get full text
Get full text
Article -
6
Global gbest guided-artificial bee colony algorithm for numerical function optimization
Published 2018“…The two well-known honeybees-based upgraded algorithms, Gbest Guided Artificial Bee Colony (GGABC) and Global Artificial Bee Colony Search (GABCS), use the foraging behavior of the global best and guided best honeybees for solving complex optimization tasks. …”
Get full text
Get full text
Article -
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
8
A Comparison of Particle Swarm optimization and Global African Buffalo Optimization
Published 2020“…However, in this paper, a comparison between Particle Swarm Optimization (PSO) and Global African Buffalo Optimization (GABO) algorithms was performed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Hybridizing Invasive Weed Optimization with Firefly Algorithm for Unconstrained and Constrained Optimization Problems
Published 2017“…This study presents a hybrid invasive weed firefly optimization (HIWFO) algorithm for global optimization problems. …”
Get full text
Get full text
Get full text
Article -
10
Global Particle Swarm Optimization for High Dimension Numerical Functions Analysis
Published 2014“…The Particle Swarm Optimization (PSO) Algorithm is a popular optimization method that is widely used in various applications, due to its simplicity and capability in obtaining optimal results. …”
Get full text
Get full text
Get full text
Article -
11
A Novel Discrete Filled Function Algorithm in Solving Discrete Optimization Problems (S/O: 12408)
Published 2016“…Several global methods have been proposed for solving discrete optimization problems. …”
Get full text
Get full text
Monograph -
12
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
13
Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost
Published 2024“…In this method, the Gray Wolf optimized algorithm (EBGWO) is further optimized by particle swarm optimization (PSO), and when combined with it, the convergence performance of the model is improved, the parameters of the model are reduced, and the model is simplified. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Review of optimal methods and algorithms for sizing energy storage systems to achieve decarbonization in microgrid applications
Published 2023“…Carbon; Decarbonization; Electric energy storage; Fossil fuels; Global warming; Renewable energy resources; Carbon emissions; Decarbonisation; Energy storage system; Method; Microgrid; Optimal energy; Optimization algorithms; Sizing; Storage systems; System sizings; Cost effectiveness…”
Review -
16
Global optimization method for continuous - Time sensor scheduling
Published 2010“…We consider a situation in which several sensors are used to collect data for signal processing since operating multiple sensors simultaneously canses system interference, only one sensor can be active at any one time.The problem of scheduling a discrete-valued optimal control problem.This problem cannot be solved using conventional optimization problem.The Transformed problem is then decomposed into a bi-level optimization problem, which is solved using a discreate filled function method in conjunction with a conventional optimal control algorithm.Numerical results show that our algorithm is robust, efficient, and reliable in attaining a near globally optimal solution.…”
Get full text
Get full text
Get full text
Article -
17
-
18
Global Algorithms for Nonlinear Discrete Optimization and Discrete-Valued Optimal Control Problems
Published 2009“…One of the more recent global optimization tools in the area of discrete optimization is known as the discrete filled function method. …”
Get full text
Get full text
Get full text
Thesis -
19
Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization
Published 2019“…In another hand, numerical results of ABCED Conjugate Gradient Methods also achieved up to 80.95% of the selected benchmark global optimization been solved successfully. …”
Get full text
Get full text
Get full text
Thesis -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
