Search Results - (( developing innovative encryption algorithm ) OR ( java code classification algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2
  3. 3

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
    Get full text
    Get full text
    Monograph
  7. 7

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Every country has different requirements when requesting block cipher so there is no limit in developing them. According to the National IT Council (NlTC) report on "Securing Malaysia Sovereignty in the CyberWorld" provided by Ministry of Science, Technology and Innovation, Malaysia, they have outlined critical areas in which new and additional research and development is needed to increase the protection of the national information infrastructure. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12