Search Results - (( developing process a algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…Electronic voting system must attempt to achieve at least the same level of security as ordinary elections. We have developed an electronic voting system, E-Voting for a general election. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…This thesis steps towards developing a netv orked board game, supporting multiple players. …”
    Get full text
    Get full text
    Thesis
  4. 4

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  8. 8

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Modelling and environmental assessment of heterogeneous catalysis biodiesel process using war algorithm by As Eleyana, Ali

    Published 2013
    “…WAR algorithm, a methodology for determining the potential environmental impact (PEI) of a chemical process is developed to describe the flow and the generation of PEI through a chemical process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…The algorithms to be developed will consist of pre-processing, enhancement and image segmentation. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Literature Survey On Stereo Vision Disparity Map Algorithms by Rostam Affendi, Hamzah, Haidi, Ibrahim

    Published 2016
    “…To assist future researchers in developing their own stereo matching algorithms, a summary of the existing algorithms developed for every stage of processing is also provided. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A filtering algorithm for efficient retrieving of DNA sequence by Abdul Rahman, Mohd Nordin, Mohd. Saman, Md. Yazid, Ahmad, Aziz, Md. Tap, Abu Osman

    Published 2009
    “…The aim of this study is to develop a filtering algorithm in order to reduce the iteration of dynamic programming process and therefore an efficient process of retrieving a set of similar DNA sequences in database can be made. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of Simulated Annealing Based Scheduling Algorithm for Two Machines Flow Shop Problem by M., Muziana, Kamal Z., Zamli

    Published 2015
    “…It is expected that the developed algorithm will perform well if not a par with Johnson’s algorithm…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…Shewhart Control Chart (SCC) and Range Control Chart (RCC) are used with the developed correlation coefficients for FDD. The developed FDD algorithm was implemented on a simulated distillation column which is a single equipment process. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Real time algorithm for the portable recording of fetal and maternal heart rates by Ahmed Firoz, Ali M.Alauddin Mohd, Zahedi Edmond

    Published 2023
    “…A PIC17C44 microcontroller development board and a real-time algorithm were developed with the capability of monitoring the fetal heart rate (FHR) as well as recording both the FHR and maternal heart rate (MHR) for 24 hours. …”
    Conference paper
  19. 19

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD by ABDULLAH, H., LAW BOON HUI, C., ZAKARIA, M. S.

    Published 2023
    “…A three-dimensional model consisting of the drilling process and pocket milling process was developed using Solidworks software. …”
    Get full text
    Get full text
    Article