Search Results - (( developing small function algorithm ) OR ( java data protection algorithm ))
Search alternatives:
- protection algorithm »
- function algorithm »
- developing small »
- small function »
- java »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
Get full text
Get full text
Thesis -
7
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
8
Data Hiding Techniques In Digital Images
Published 2003“…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
Get full text
Get full text
Thesis -
9
Performance comparison of THF-NLFXLMS and VFXLMS algorithms for Hammerstein NANC
Published 2016“…Recently, THF-NLFXLMS algorithm was developed to compensate the nonlinearity encountered in nonlinear active noise control systems. …”
Get full text
Get full text
Conference or Workshop Item -
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
11
A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model
Published 2025“…The accurate prediction and characterization of small open reading frames (smORFs) are critical for understanding their functional roles in gene regulation and cellular processes. …”
Get full text
Get full text
Thesis -
12
New Instances Classification Framework On Quran Ontology Applied To Question Answering System
Published 2019“…This algorithm is chosen since it robustness to noisy data and has an excellent achievement to handle small dataset. …”
Get full text
Get full text
Get full text
Article -
13
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
14
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
15
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
16
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The algorithm is based on the Clonalg algorithm developed by de Castro and Von Zuben. …”
Get full text
Get full text
Conference or Workshop Item -
17
Developing a small footprint and low-cost solar charge controller
Published 2025“…Then, a board layout was developed with a small footprint with a size of 63.5mm x 57mm. …”
Conference paper -
18
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Then apply the MODE-based algorithm to optimize the weighting function of the control problem formulation for optimal performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Inventory tracker with estimation
Published 2024“…To address this challenge, the "Inventory Tracking and Estimating" project proposes the development of a user-friendly mobile application designed to simplify inventory management for small businesses. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Improved Bat Algorithm for faster convergence in solving optimisation problem
Published 2021“…Besides that, IBA was found comparable with existing variants of BA such as the IBA developed from the previous researcher in the year 2013 and the Hybrid Self-Adaptive Bat Algorithm (HSABA) developed in the year 2014. …”
Get full text
Get full text
Get full text
Thesis
