Search Results - (( developing string means algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- developing string »
- java application »
- means algorithm »
-
1
-
2
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Based on the dynamic shapeless quasigroup and the proposed new string transformation, a Dynamic Key Scheduling Algorithm (DKSA) is developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…They are Cross Entropy and also Genetic Algorithm. CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
8
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Design and modelling of an autonomous robotic airship with soft computing control
Published 2012“…The control system were tested on simulation which were developed from simulink. The result shows a feasible means of UAV control. …”
Get full text
Get full text
Get full text
Thesis -
10
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
11
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…The hierarchical fuzzy clustering method developed here is far better than a similar implementation of the hard k-means method. …”
Get full text
Get full text
Monograph -
12
-
13
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…The sentence selected for embedding watermarking bit are 85% higher in speed due to faster embedding watermarking bit string.The relation of information-hiding capacity is 1:5.5 which means that for every 5.5 terms of text, one bit of watermark can be hidden data. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
