Search Results - (( construct validity cloud algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- construct validity »
- java application »
- cloud algorithm »
-
1
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
2
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…FEDO facilitates cloud evidence by examining the key features and indexing the evidence. …”
Get full text
Get full text
Thesis -
3
Surface reconstruction using grayscale analysis / Nur Hamizah Hamid
Published 2012“…The test results and analysis validate the ability of the proposed solution to provide accurate 3D frontal facial model with low cost.…”
Get full text
Get full text
Thesis -
4
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Stereo Camera-Based Aerial Target Geolocation in a Ground-Based Platform Environment
Published 2024thesis::master thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis
