Search Results - (( developing affect encryption algorithm ) OR ( java _ visualization algorithm ))

Refine Results
  1. 1
  2. 2

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure by Ramasamy, Chitra, Zolkepli, Maslina

    Published 2019
    “…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  13. 13

    Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.] by Selvarajoo, Mathuri, Santono, Mohd Pawiro, Fong, Wan Heng, Sarmin, Nor Haniza

    Published 2023
    “…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  16. 16

    Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman by Othman, Mohd Pawiro Santono

    Published 2023
    “…Moreover, the languages generated by algebraic sum fuzzy splicing systems and their variants are developed by considering the threshold and the languages generated are categorized according to the Chomsky hierarchy. An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
    Get full text
    Get full text
    Article