Search Results - (( developing emerging key algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Proposed method for enhancing quantum bit error rate using quantum key distribution technique by Abubakar, M.Y., Jung, L.T., Zakaria, N.M., Foong, O.M.

    Published 2014
    “…In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Three-dimensional coverage control for multi-unmanned aerial vehicle by Siow, Wen Hao

    Published 2024
    “…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges by John Deutero, Kisoi, Norfadzlan, Yusup, Syahrul Nizam, Junaini

    Published 2025
    “…Metaheuristic algorithms have emerged as promising techniques for optimizing human activity recognition (HAR) systems. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Hybridization of nonlinear sine cosine and safe experimentation dynamics algorithms for solving control engineering optimization problems by Mohd Helmi, Suid

    Published 2024
    “…The Nonlinear Sine Cosine Algorithm (NSCA) is introduced as a key extension, incorporating a versatile nonlinear decreasing gain into the transition parameter mechanism. …”
    Get full text
    Get full text
    Thesis
  11. 11

    MOBILE DICTIONARY by Ibrahim, Siti Nabilah

    Published 2005
    “…The system incorporates a searching algorithm, by using Hashtable function. The system prototype should be able to recognize whether the input word is a single or multiword and intelligently translate the word matched by Hashtable key and value. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Recent advancement of energy internet for emerging energy management technologies: Key features, potential applications, methods and open issues by Hannan M.A., Ker P.J., Mansor M., Lipu M.H., Al-Shetwi A.Q., Alghamdi S.M., Begum R.A., Tiong S.K.

    Published 2024
    “…In consequence, a comprehensive review of energy internet features, applications, methods and existing issues and challenges are explained by developing arguments for future prospects. Key features of the energy internet such as energy sources, communication technologies, data computation, energy management systems and financial analysis are highlighted to enhance the energy efficiency, reliability, and security of the power network. …”
    Review
  13. 13

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    Reverse migration prediction model based on machine learning / Azreen Anuar by Anuar, Azreen

    Published 2024
    “…In addition, the results from the three (3) algorithms that were tested showed that Random Forest outperforms other algorithms by acquiring an accuracy and classification error to predict reverse migration. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…Furthermore, this review identifies future research priorities, including the integration of dynamic simulation with real-time optimization, and the development of lifecycle-oriented, comprehensive evaluation systems to address emerging environmental challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Smart IoT energy optimisation and localisation monitoring for e-bike sharing by Mohamed, Mawada Ahmed, Toha, Siti Fauziah, Rahman, Md Ataur, Khairudin, Moh.

    Published 2025
    “…The methodology involved integrating sensors to collect key data, implementing connectivity for real-time monitoring, and developing an energy optimization algorithm to prolong battery life, improving the efficiency of the e-bike sharing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A Conceptual Framework to Aid Attribute Selection in Machine Learning Student Performance Prediction Models by Khan I., Ahmad A.R., Jabeur N., Mahdi M.N.

    Published 2023
    “…Machine learning algorithms emerge as useful tools to endorse learning analytics by building models capable of forecasting the final outcome of students based on their available attributes. …”
    Article
  19. 19

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…Sensor failure, environmental changes, or bad weather can lead to the emergence of abnormal data, which can affect the decision-making process and may have disastrous consequences. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20