Search Results - (( java application customization algorithm ) OR ( software information method algorithm ))
Search alternatives:
- customization algorithm »
- software information »
- information method »
- java application »
- method algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
2
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
-
4
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
5
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
6
-
7
An Algorithmic Approach for Stability of an Autonomous System
Published 2002“…By doing so we will be able to help those who are not familiar with analytical methods to establish stability of systems at hand The following algorithm is' employed in developing the software: L 1. …”
Get full text
Get full text
Thesis -
8
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Towards optimal search: a modified secant method for efficient search in a big database
Published 2018Get full text
Get full text
Conference or Workshop Item -
13
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Securing password authentication using MD5 algorithm
Published 2014Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…One of the crucial usages is internet crawling to find the best information using keywords. The searching algorithm has been one of the famous algorithm which is used throughout most of the existing software, such as Google, Facebook, Twitter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project
