Search Results - (( _ expansion function algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- function algorithm »
- application sensor »
- java application »
- sensor algorithm »
-
1
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017“…Therefore, although the two properties within the substitution-permutation construct are only applied to state the transformation round function of the Rijndael algorithm, but there is no other strong security for the key expansion function. …”
Get full text
Get full text
Conference or Workshop Item -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
3
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
4
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
Published 2005“…This transformation function improves the security of the AES algorithm by increasing the randomness of the AES output sequence. …”
Get full text
Get full text
Thesis -
5
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
Get full text
Get full text
Thesis -
7
Modern fuzzy min max neural networks for pattern classification
Published 2019“…The MDFMM introduces a number of contributions in addition to modify the original FMM expansion activation function by replace it with that from the Enhanced Fuzzy Min Max (EFMM) to eliminate the overlapping cases. …”
Get full text
Get full text
Thesis -
8
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Factors contributing to the failure are a mathematical weakness found in the Boolean functions used by these cryptographic hash functions, linear message expansion and poor difusion in the step operation. …”
Get full text
Get full text
Thesis -
9
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
Get full text
Thesis -
10
Fast sequential learning methods on RBF-network using decomposed training algorithms
Published 2004“…This work investigates novel sequential learning methods applied on a decomposed form of training algorithms using radial basis function (RBF) network. …”
Get full text
Get full text
Conference or Workshop Item -
11
Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail
Published 2014“…In this dissertation, we propose a transformation called Recursive Variable Expansion (RVE), which can be applied to an important category of loops. …”
Get full text
Get full text
Thesis -
12
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
Get full text
Get full text
Article -
13
The concept of wound healing algorithm
Published 2023“…We emphasise the criteria of lightweight processing and reliability as the main expansions of the algorithm. Finally, we will analyse the model and algorithm in comparison with existing algorithms and provide insights on the performance and capabilities of the proposed models.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
14
Location determination using radio frequency RSSI and deterministic algorithm
Published 2008Get full text
Get full text
Conference or Workshop Item -
15
Penglihatan Foveal (Foveal Vision)
Published 2006“…This is such a healthy expansion and typically can increase the development of other related fields. …”
Get full text
Get full text
Monograph -
16
Development of a scalable video compression algorithm
Published 2012“…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Chaos search in fourire amplitude sensitivity test
Published 2012“…This paper explores the characterization of learning functions involved in FAST and derives the underlying dynamical relationships with chaos search, which can provide new learning algorithms. …”
Get full text
Get full text
Get full text
Article -
18
Chaos Search in Fourier Amplitude Sensitivity Test
Published 2012“…This paper explores the characterization of learning functions involved in FAST and derives the underlying dynamical relationships with chaos search, which can provide new learning algorithms. …”
Get full text
Get full text
Get full text
Article -
19
Wavelet analysis method for solving linear and nonlinear singular boundary value problems
Published 2013“…Chebyshev wavelets expansions together with operational matrix of derivative are employed to solve ordinary differential equations in which, at least, one of the coefficient functions or solution function is not analytic. …”
Get full text
Get full text
Article -
20
Automated Maze Robot
Published 2011“…The findings in this project are the maze that is being used, the linear maze; the robot that is being used, the Pololu 3pi Robot; the algorithm that has been chosen to be implemented, the Wall Following Algorithm; the implementation of the project, how the robot operates; the tests that had been ran, the Fault Injection Test, the NonFunctional Test and the Integration Test; and the test results, the success rate and the failure rate. …”
Get full text
Get full text
Final Year Project
