Search Results - (( development program specialization algorithm ) OR ( java feature encryption algorithm ))

Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Heuristic approach to solution of unit commitment for electrical system / Azizan Harun by Harun, Azizan

    Published 1996
    “…The program is flexible and considers numerous special operating restrictions or constraints. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. The latter is developed using an adapted algorithm of Hejhal and Then which is based on implicit automorphy and finite Fourier series. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Physical and computational modeling for finite element analysis by Che Muda, Zakaria

    Published 1988
    “…In the past, the majority of papers relating to F.E analysis were related to the development of new special elements and the computational algorithms for equation or eigenvalue solutions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    The Development of Color Based Visual Search Utility by Mohamed, Al Mabruk S.

    Published 2001
    “…Secondly, the color algorithm was developed to interpret natural expressions of content such as 10%, 20%, etc. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…The application was programmed by JAVA FX. The system was developed stage by stage as it is consist of many small components to form a large system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network by Khairi, Kharina

    Published 2003
    “…The algorithm was developed in Visual Basic 6.0v programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Speed control of separately excited dc motor using artificial intelligent approach by Bernard, Albinus

    Published 2013
    “…The effectiveness of the proposed method is verified by develop simulation model in MATLAB-Simulink program. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Effect of viscous dampers on yielding mechanisms of RC structures during earthquake by Hejazi, Farzad, Shoaei, Mohammad Dalili, Jaafar, Mohd Saleh

    Published 2015
    “…A special finite element computer program was codified based on the developed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Framework of Designing Multiple Microcontroller Based Applications by Selvakumar, Raja Saravana Kumar, Kamarul Hawari, Ghazali, Nik Mohd Kamil, Nik Yusof

    Published 2011
    “…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Framework of Multi-Microcontroller Evaluation Tool for a use of Academic Environment by Selvakumar, Raja Saravana Kumar, Kamarul Hawari, Ghazali, Nik Mohd Kamil, Nik Yusof

    Published 2012
    “…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    An efficient method for audio watermarking using SWT and mean value quantization by Mushgil, Baydaa Mohammad

    Published 2016
    “…Digital watermarking has been capturing the interests in programming society several decades ago due to the development of software and programming techniques that cause an increase in illegal use of digital files. …”
    Get full text
    Get full text
    Thesis
  20. 20