Search Results - (( developing block force algorithm ) OR ( java visualization learning algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The symmetric block cipher is one of the most significant cryptographic algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan by Jamel, Shafie, Sayan, Giuseppina Sherry

    Published 2009
    “…This paper presents an algorithm animation for cryptanalysis of Caesar Cipher using ciphertext only attack and Hill Cipher using Brute force technique. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Furthermore, the proposed KSA algorithm has been validated using the randomness test proposed and recommended by NIST, avalanche test and has achieved remarkable result of 94%, brute force and correlation assessment test with -0.000449 correlations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System by Ahmed Al- Wathaf, Ahmed Hasan

    Published 2006
    “…An incremental-iterative 2-D nonlinear finite element code is developed to implement the proposed algorithm and analyze the masonry system till failure. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil by Idris, Siti Aishah, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An active lower-extremity exoskeleton for synchronous mobility assistance in lifting and carrying manual handling task / Sado Fatai by Sado , Fatai

    Published 2019
    “…In this study, a new 12-DOF lower extremity EHPA called UMExoLEA (Universiti Malaya Exoskeleton for Lower Extremity Augmentation) with 4-active bi-directional brushless DC motor actuation and a novel synchronous mobility control algorithm are developed to provide smooth lower-extremity mobility augmentation in lifting/carrying MH works. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Also, user attributes are stored in the block storage using an InterPlanetary File System (IPFS) protocol to eliminate the concept of centralizing storage. …”
    Get full text
    Get full text
    Thesis