Search Results - (( integer implementation encryption algorithm ) OR ( java data collection algorithm ))
Search alternatives:
- implementation encryption »
- integer implementation »
- collection algorithm »
- java »
-
1
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…CPU implementations are becoming less efficient in handling the computation of crypto algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Triangular Coordinate Extraction (TCE) technique has also been introduced to extract the coordinates during the rotation of Hybrid Cube surface (HCs) and plays an important role in the development of KSAHC algorithm. The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
4
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…The generation of Hybrid Cubes (HC) based on permutation and combination of integer numbers are utilized in the construction of encryption and decryption key in the non-binary block cipher. …”
Get full text
Get full text
Article -
5
-
6
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
7
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…This study describes three algorithms for efficient implementations in Elliptic Curve Cryptography (ECC). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
9
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Thesis -
10
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Get full text
Thesis -
11
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. …”
Get full text
Get full text
Monograph -
12
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. …”
Get full text
Get full text
Get full text
Article -
13
Human activity recognition via accelerometer and gyro sensors
Published 2023“…Lastly, the project paves the way for establishment of standardized dataset, with streamlined data collection, data annotation and data storage, and allow comparative research and benchmarking.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…These cognitive maps are then stored in a data warehouse and ready to collect anytime for analytics purposes. …”
Get full text
Get full text
Thesis -
15
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…The second-level learner uses logistic regression (LR) to aggregate the final prediction output. The landslide data together with its conditioning factors (feature variables) collected from three districts in the Central Java Province, Indonesia, has been used as the case study for the LSM. …”
Conference Paper -
16
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…Besides, an android application is being cre-ated to give therapy based on machine learning predictions. To collect data, we enlisted the help of 4,500 people. …”
Get full text
Get full text
Get full text
Article -
17
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise
