Search Results - (( developing new bit algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations by Mohd Ali, Fakariah Hani, Mahmod, Ramlan, Rushdan, Mohammad, Abdullah, Ismail

    Published 2009
    “…This research proposes the use of cyclic shift and bit wise XOR operation as new approach to replace the lookup table. …”
    Get full text
    Get full text
    Article
  4. 4

    Watermarking technique based on ISB (Intermediate Significant Bit) by Zeki, Akram M., Abdul Manaf, Azizah, Olanweraju, Rashidah Funke

    Published 2010
    “…The new model has been developed based on intermediate significant bit (ISB) aim to replace the watermarked image pixels by new pixels that can protect the watermark data against attacks and at the same time keeping the new pixels very close to the original pixels in order to protect the quality of watermarked image. …”
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    AES S-box modification uses affine matrices exploration for increased S-box strength by Alamsyah, Alamsyah, Setiawan, Abas, Trisnawan Putra, Anggyi, Budiman, Kholiq, Muslim, Much Aziz, Salahudin, Shahrul Nizam, Prasetiyo, Budi

    Published 2025
    “…The internet and technological advancements are rapidly growing in this era, potentially giving rise to new challenges, particularly in data security. One algorithm developed to secure data is the Advanced Encryption Standard (AES). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Design and development of high performance swa cell design for local DNA sequence alignment by Syed Abdul Rahman, Syed Abdul Mutalib Al Junid

    Published 2017
    “…The OSL, OSA and ORSL proposed a new optimized two bit data representation format for DNA sequence characters, which is previously designed based on the eight bit ASCII 2 characters format. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improved scalar multiplication algorithm in affine coordinate system using elliptic net by Razali, Zuren, Muslim, Norliana, Kahar, Saliyah, Yunos, Faridah, Mohamed, Kamsiah

    Published 2022
    “…In a similar comparison for the 512-bits case, the proposed algorithm attained are 67.23 %, 44.65 %, 30.37 %, and 22.64 % faster, respectively.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparative analysis of Selective Clonal Mutation with conventional GA operators in solar tracking environment by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Genetic Algorithm (GA) belongs to elementary stochastic optimization algorithms inspired by evolution.It points out the ability of simple representations using bit strings to encode complicated structures and the power of simple transformations to reach the desired solution. …”
    Conference Paper
  17. 17

    Error correction for CDMA code in mobile communication by Tiong S.K., Tan C.H., Ding J., Ismail M.

    Published 2023
    “…The new logic symbol repetition is a "memorizing" encoding scheme that able to correct the error bits, not only presently received bits but also errors in the previous received bits in case of block noise occurrence. …”
    Conference paper
  18. 18

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. The proposed new algorithm was evaluated and the results indicate that it was practical in low bit rate environments targeted by H.263 as no negative speed gain was observed for the full range of step size during the evaluation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations by Mohd Ali, Fakariah Hani

    Published 2004
    “…The new approach algorithm speed increment has consistently increased in between 18% to 22% microsecond for encryption and 30% to 34% for decryption compared to Rijndael algorithm.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Proposed method for enhancing quantum bit error rate using quantum key distribution technique by Abubakar, M.Y., Jung, L.T., Zakaria, N.M., Foong, O.M.

    Published 2014
    “…In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
    Get full text
    Get full text
    Conference or Workshop Item