Search Results - (( developing new bit algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…Meanwhile the PC-based software internal structure was developed and categorized under six modules which are Menu, Interpreter, 3D Simulation, Machine Motion System, Drill Bit Monitoring and Live Thermal Monitoring. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations by Mohd Ali, Fakariah Hani, Mahmod, Ramlan, Rushdan, Mohammad, Abdullah, Ismail

    Published 2009
    “…This research proposes the use of cyclic shift and bit wise XOR operation as new approach to replace the lookup table. …”
    Get full text
    Get full text
    Article
  5. 5

    Watermarking technique based on ISB (Intermediate Significant Bit) by Zeki, Akram M., Abdul Manaf, Azizah, Olanweraju, Rashidah Funke

    Published 2010
    “…The new model has been developed based on intermediate significant bit (ISB) aim to replace the watermarked image pixels by new pixels that can protect the watermark data against attacks and at the same time keeping the new pixels very close to the original pixels in order to protect the quality of watermarked image. …”
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    AES S-box modification uses affine matrices exploration for increased S-box strength by Alamsyah, Alamsyah, Setiawan, Abas, Trisnawan Putra, Anggyi, Budiman, Kholiq, Muslim, Much Aziz, Salahudin, Shahrul Nizam, Prasetiyo, Budi

    Published 2025
    “…The internet and technological advancements are rapidly growing in this era, potentially giving rise to new challenges, particularly in data security. One algorithm developed to secure data is the Advanced Encryption Standard (AES). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Design and development of high performance swa cell design for local DNA sequence alignment by Syed Abdul Rahman, Syed Abdul Mutalib Al Junid

    Published 2017
    “…The OSL, OSA and ORSL proposed a new optimized two bit data representation format for DNA sequence characters, which is previously designed based on the eight bit ASCII 2 characters format. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved scalar multiplication algorithm in affine coordinate system using elliptic net by Razali, Zuren, Muslim, Norliana, Kahar, Saliyah, Yunos, Faridah, Mohamed, Kamsiah

    Published 2022
    “…In a similar comparison for the 512-bits case, the proposed algorithm attained are 67.23 %, 44.65 %, 30.37 %, and 22.64 % faster, respectively.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comparative analysis of Selective Clonal Mutation with conventional GA operators in solar tracking environment by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Genetic Algorithm (GA) belongs to elementary stochastic optimization algorithms inspired by evolution.It points out the ability of simple representations using bit strings to encode complicated structures and the power of simple transformations to reach the desired solution. …”
    Conference Paper
  20. 20