Search Results - (( ict computer based algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- computer based »
- ict computer »
-
1
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The current parametric encryption algorithms suffer the unconventional and paranormal attacks. …”
Get full text
Get full text
Proceeding Paper -
6
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
7
A proposed framework for fish behaviors based on boid simulator
Published 2016Get full text
Get full text
Conference or Workshop Item -
8
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Computational thinking or CT refers to the thought processes involved in expressing solutions as computational steps or algorithms that can be carried out by a computer. …”
Get full text
Get full text
Get full text
Article -
9
A bit-serial architecture for a multiplierless DCT
Published 2003Get full text
Get full text
Get full text
Article -
10
Energy saving monitoring using fuzzy logic for computing lab
Published 2019“…In this paper, a brief overview on Green ICT implementation in IIUM computer lab by the help of energy audit in ICT lab, survey questionnaires and interview sessions. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Frameworks for a computational Isnad authentication and mechanism development
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
On network flow problems with convex cost
Published 2004Get full text
Get full text
Get full text
Article -
13
A Bayesian probability model for Android malware detection
Published 2022Get full text
Get full text
Get full text
Article -
14
Text categorization using naive bayes algorithm
Published 2006Get full text
Get full text
Conference or Workshop Item -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
18
Task-based assessment on various optimization protocols of computed tomography Pulmonary Angiography examination
Published 2021“…This prospective study was designed to assess CT performance by using the task-based image quality assessment and to identify the influence of iterative reconstruction (IR) algorithm, tube potential and pitch factor selection on dose and image quality during Computed Tomography Pulmonary Angiography (CTPA) examination. …”
Get full text
Get full text
Get full text
Article -
19
A Bayesian probability model for Android malware detection
Published 2021Get full text
Get full text
Get full text
Article -
20
