Search Results - (( java features encryption algorithm ) OR ( basic competency based algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling by Anuar, Nurul Izah

    Published 2022
    “…It is also discovered that the hybrid-discrete MOPSO (HD-MOPSO) algorithm manages to obtain higher values in the performance metrics consisting of non-dominance ratio and hypervolume compared to the competing algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Composing multi-relations association rules from crowdsourcing remuneration data by Siti Salwa Salleh, Nurhayati Zakaria, Norjansalika Janom, Syaripah Ruzaini Syed Aris, Noor Habibah Arshad

    Published 2022
    “…To assign it to a worker, the platform must first identify the types of tasks and match them to the appropriate workers based on their level of competency. Each worker has different ICT competencies which affect work quality and remuneration. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Investigating computational thinking among primary school students in Terengganu using visual programming by Osmanullrazi, Abdullah

    Published 2022
    “…The findings of this study reveal that although the participants’ CT skills competency in the animation phase is in the Basic level, there is improvement of CT skills competency to the Developing level in the game phase. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article