Search Results - (( based information efficient algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    Efficient Entropy-Based Decoding Algorithms For Higher-Order Hidden Markov Model by Chan, Chin Tiong

    Published 2019
    “…This algorithm is a memory-efficient algorithm due to its required memory space that is time independent. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Design of information hiding algorithm for multi-link network transmission channel by Fu, Songyin, Wang, Rangding

    Published 2019
    “…The average time spent on hiding information is 2.04 s, indicating that the algorithm has high information hiding rate and storage efficiency.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Energy Efficient Technique for Cluster Head Selection and Data gathering in Wireless Sensor Network by Asfandyar, khan, Imran, M., Azween, Abdullah

    Published 2008
    “…All nodes after the first round send energy level and distance information from the base station (BS) to the cluster-head. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications by Jahani, Shahram, Samsudin, Azman, Subramanian, Kumbakonam Govindarajan

    Published 2014
    “…In this paper, we introduce new symbols extracted from binary representation of integers called Big-ones.We present a modified version of the classicalmultiplication and squaring algorithms based on the Big-ones to improve the efficiency of big integermultiplication and squaring in number theory based cryptosystems. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    An Improved Genetic Clustering Algorithm for Categorical Data by Jasni, Mohamad Zain, Qin, Hongwu, Ma, Xiuqin, Herawan, Tutut

    Published 2013
    “….: G-ANMI: A mutual information based genetic clustering algorithm for categorical data, Knowledge-Based Systems 23, 144–149(2010)] proposed a mutual information based genetic clustering algorithm named G-ANMI for categorical data. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13
  14. 14

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…For future studies, the proposed encryption algorithm can be enhanced by combined compression encryption techniques, which would increase the encryption efficiency. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model by Kaur, Arvinder, Kumar, Yugal

    Published 2021
    “…It was observed that the WWO algorithm suffered from the absence of global best information and premature convergence problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  20. 20