Search Results - (( _ expansion function algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits by Hussien, Hassan Mansour, Muda, Zaiton, Md. Yasin, Sharifah

    Published 2017
    “…Therefore, although the two properties within the substitution-permutation construct are only applied to state the transformation round function of the Rijndael algorithm, but there is no other strong security for the key expansion function. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm by Abdulbari Ali, Sherif

    Published 2005
    “…This transformation function improves the security of the AES algorithm by increasing the randomness of the AES output sequence. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations by Mohd Ali, Fakariah Hani

    Published 2004
    “…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Modern fuzzy min max neural networks for pattern classification by Al Sayaydeh, Osama Nayel Ahmad

    Published 2019
    “…The MDFMM introduces a number of contributions in addition to modify the original FMM expansion activation function by replace it with that from the Enhanced Fuzzy Min Max (EFMM) to eliminate the overlapping cases. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…Factors contributing to the failure are a mathematical weakness found in the Boolean functions used by these cryptographic hash functions, linear message expansion and poor difusion in the step operation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Fast sequential learning methods on RBF-network using decomposed training algorithms by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2004
    “…This work investigates novel sequential learning methods applied on a decomposed form of training algorithms using radial basis function (RBF) network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail by Ismail, Muhamad Faiz

    Published 2014
    “…In this dissertation, we propose a transformation called Recursive Variable Expansion (RVE), which can be applied to an important category of loops. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations by Mohd Ali, Fakariah Hani, Mahmod, Ramlan, Rushdan, Mohammad, Abdullah, Ismail

    Published 2009
    “…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
    Get full text
    Get full text
    Article
  13. 13

    The concept of wound healing algorithm by Jonathan Likoh Juis @ Juise, Teong, Khan Vun, Ryan MacDonnell Andrias, Jetol Bolongkikit, Siti Hasnah Tanalol, Asni Tahir

    Published 2023
    “…We emphasise the criteria of lightweight processing and reliability as the main expansions of the algorithm. Finally, we will analyse the model and algorithm in comparison with existing algorithms and provide insights on the performance and capabilities of the proposed models.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  14. 14
  15. 15

    Penglihatan Foveal (Foveal Vision) by Mohd Zol, Azida

    Published 2006
    “…This is such a healthy expansion and typically can increase the development of other related fields. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Chaos search in fourire amplitude sensitivity test by Koda, Masato

    Published 2012
    “…This paper explores the characterization of learning functions involved in FAST and derives the underlying dynamical relationships with chaos search, which can provide new learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Chaos Search in Fourier Amplitude Sensitivity Test by Koda, Masato

    Published 2012
    “…This paper explores the characterization of learning functions involved in FAST and derives the underlying dynamical relationships with chaos search, which can provide new learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Wavelet analysis method for solving linear and nonlinear singular boundary value problems by Nasab, A. Kazemi, Kilicman, Adem, Babolian, E., Atabakan, Z. Pashazadeh

    Published 2013
    “…Chebyshev wavelets expansions together with operational matrix of derivative are employed to solve ordinary differential equations in which, at least, one of the coefficient functions or solution function is not analytic. …”
    Get full text
    Get full text
    Article
  20. 20

    Automated Maze Robot by Jalil, Mohammad Izzuddin

    Published 2011
    “…The findings in this project are the maze that is being used, the linear maze; the robot that is being used, the Pololu 3pi Robot; the algorithm that has been chosen to be implemented, the Wall Following Algorithm; the implementation of the project, how the robot operates; the tests that had been ran, the Fault Injection Test, the NonFunctional Test and the Integration Test; and the test results, the success rate and the failure rate. …”
    Get full text
    Get full text
    Final Year Project