Search Results - (( developing block new algorithm ) OR ( java optimization method algorithm ))

Refine Results
  1. 1
  2. 2

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    New Generalized Algorithm for Developing k-Step Higher Derivative Block Methods for Solving Higher Order Ordinary Differential Equations by Adeyeye, Oluwaseun, Omar, Zurni

    Published 2018
    “…This article presents a new generalized algorithm for developing k-step (m+1) derivative block methods for solving mth order ordinary differential equations. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    New uniform order eigh hybrid third derivative block method for solving second order initial value problems by Adeyeye, Oluwaseun, Omar, Zurni

    Published 2016
    “…The methodology employed involves a new generalized algorithm for developing the hybrid block method which is another novel contribution existing in this work. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The symmetric block cipher is one of the most significant cryptographic algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Developing triad design algorithms based on compatible factorization by Ibrahim, Haslinda, Omar, Zurni, Abdul Rahim, Rahela

    Published 2011
    “…These processes have helped us develop algorithm for triad design, the objective of this study.A new technique for triad design algorithm, known as Interval Generation Method was employed to construct TD(6n + 1) and TD(6n + 5).This method depends on analyzing the pattern of triples in the design to build starters.We begin by producing starters from Interval Generation Method as the initial block to begin with.Then the algorithm begins by cycling modular v from the initial block and finishes when the process approaches the initial block.The algorithms for TD(6n+1) and TD(6n+5) are presented in Chapter 4 and 5, respectively.As the entire study depends mainly on TD(v) algorithms, new and remarkable theorems and lemmas for TD(v) development are presented and proved.…”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Parallel block methods for solving higher order ordinary differential equations directly by Omar, Zurni

    Published 1999
    “…A new parallel algorithm for solving systems of ODEs using variable step size and order is also developed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
    Get full text
    Get full text
    Thesis
  16. 16

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…The aims for this study is to develop and design a new hybrid search pattern and strategy for new fast BMAs that can further improve the ME process in terms of estimation accuracy and video image quality, searching speed and computational complexity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Optimize class time tabling by using genetic algorithm technique in UTHM by Ahmad, Izah Rafidah

    Published 2019
    “…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20