Search Results - (( java application _ algorithm ) OR ( using computer function algorithm ))
Search alternatives:
-
1
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
2
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
3
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Signatory however use a special Digital Signature Application which store the secret private key. The application was programmed by JAVA FX. …”
Get full text
Get full text
Thesis -
4
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
5
Network monopoly / Tan Kean Yeap
Published 2002“…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…In this paper, we are presenting a new and efficient computations algorithm for LUC Cryptosystems. We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
11
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
12
-
13
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Smaller computation time means the algorithm is efficient than the other. …”
Get full text
Get full text
Conference or Workshop Item -
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
-
16
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
Get full text
Get full text
Article -
17
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The computation time analysis shows that whene doubling with remainder technique is used, the improvement of the speed rises rapidly compared to the standard implementation of the LUC algorithm and LUC algorithm with doubling rule. …”
Get full text
Get full text
Thesis -
18
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
19
A new computation algorithm for a cryptosystem based on Lucas Functions
Published 2008“…Most of public-key cryptosystems rely on one-way functions. The cryptosystems can be used to encrypt and sign messages. …”
Get full text
Article -
20
Protein Conformantional Search Using Bees Algorithm
Published 2008“…To this end, an energy function is used to calculate its energy and a conformational search algorithm is used to search the conformational search space to find the lowest free energy corformation.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
