Search Results - (( development _ interception algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- interception algorithm »
- java application »
-
1
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…They need to communicate in secure environment to avoid eavesdropping or interception. The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
Get full text
Get full text
Thesis -
2
An efficient likelihood-based modulation classification algorithm for multiple-input multiple-output systems
Published 2016“…To overcome the problems associated with the existing likelihood-based MC algorithms, a new algorithm is developed in this paper. …”
Get full text
Get full text
Article -
3
Methods of aircraft trajectory optimisation in air combat
Published 2007“…An algorithm has been developed and implemented using Evolutionary Programming. …”
Get full text
Get full text
Article -
4
Development of algorithm for single axis sun tracking system
Published 2016“…In this paper, the focus is on the integration of solar tracking system with performance analyzer system through the development of an algorithm for optimizing the performance of SEGS. …”
Get full text
Get full text
Conference or Workshop Item -
5
Rekabentuk, Analisis Dan Perlaksanaan Sistem Ka Walan Meriam
Published 1999“…time taken by a shell and a target to arrive at the same position which is known as point of intercept. The prediction algorithm has been developed using numerical method which tunes the time of flight and gun aiming point to obtain the point of intercept error within an acceptable maximum value or predetermined tuning iteration. …”
Get full text
Get full text
Thesis -
6
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…Current AES standards are applied to encrypt and protect and the content of motion images being transmitted as to minimize un-authorized access or interception. This paper outlines the possible weaknesses within the current AES encryption algorithm especially against algebraic based cryptanalysis. …”
Conference paper -
9
Optimal Real Time Evasion against High Speed Pursuer Using Evolutionary Programming
Published 2006“…The pursuer simply home-in to the evader and the evader follows the trajectory suggested from the algorithm. In both scenarios, the evader is able to steer itself from interception.…”
Get full text
Get full text
Conference or Workshop Item -
10
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
13
Detection of butter adulteration with lard by employing 1H-NMR spectroscopy and multivariate data analysis
Published 2014“…The spectroscopic data of butter adulterated with lard samples were chemometrically evaluated and calibrated using the partial least square (PLS) algorithm. The multivariate calibration of PLS model for the prediction of adulterant was developed for quantitative measurement. …”
Get full text
Get full text
Conference or Workshop Item -
14
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. …”
Get full text
Get full text
Get full text
Article -
15
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
Get full text
Get full text
Get full text
Thesis -
16
FT-IR- based metabolomics approach to characterize the α-glucosidase inhibitory activity of Salak fruit
Published 2017“…A successful the model was validated by comparing the model intercept values with original values.…”
Get full text
Get full text
Get full text
Proceeding Paper -
17
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. …”
Get full text
Get full text
Get full text
Article -
18
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
Get full text
Get full text
Thesis
