Search Results - (( java applications using algorithm ) OR ( using computer function algorithm ))
Search alternatives:
- applications using »
- function algorithm »
- java applications »
- using algorithm »
-
1
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
2
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
3
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Signatory however use a special Digital Signature Application which store the secret private key. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Network monopoly / Tan Kean Yeap
Published 2002“…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
Get full text
Get full text
Thesis -
8
-
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
-
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…In this paper, we are presenting a new and efficient computations algorithm for LUC Cryptosystems. We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
13
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
14
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Smaller computation time means the algorithm is efficient than the other. …”
Get full text
Get full text
Conference or Workshop Item -
15
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
Get full text
Get full text
Article -
16
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…The computation time analysis shows that whene doubling with remainder technique is used, the improvement of the speed rises rapidly compared to the standard implementation of the LUC algorithm and LUC algorithm with doubling rule. …”
Get full text
Get full text
Thesis -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
20
A new computation algorithm for a cryptosystem based on Lucas Functions
Published 2008“…Most of public-key cryptosystems rely on one-way functions. The cryptosystems can be used to encrypt and sign messages. …”
Get full text
Article
