Search Results - (( java features encryption algorithm ) OR ( basic computing among algorithm ))
Search alternatives:
- features encryption »
- basic computing »
- computing among »
- among algorithm »
- java features »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
3
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
4
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
5
-
6
Communication and computational cost on parallel algorithm of PDE elliptic type
Published 2009Get full text
Get full text
Book Section -
7
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…As a route improvement strategy, two heuristics which are the swap among routes procedure and 3-opt algorithm are also employed within the ASH algorithm. …”
Get full text
Get full text
Thesis -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
9
A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia
Published 2018“…The proposed algorithm is able to measure the similarities among all pairs of stocks in Bursa Malaysia at once. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…It is undeniable that a digital native must begin with at least a basic level of computer knowledge in order to manage their education and daily life. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
-
15
-
16
Block Matching Algorithm (BMA) of the Hybrid Adaptive Rood Pattern Search (ARPS) Based on Its Motion Speed
Published 2017“…There are several numbers famous proposed Block Matching Algorithm (BMA) in video coding technique and among it, the ARPS is a well known BMA technique that produce lower computational complexity and higher quality of the encoded video at the same time. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…Basically, a fair schedule can be defined as a well-balanced distribution of tasks among machines or staff by satisfying most of their constraints and personal preferences. …”
Get full text
Get full text
Get full text
Thesis -
18
The A-rray: visual animation in learning structured programming / Wan Salfarina Wan Husain ,Siti Hasrinafasya Che Hassan and Wan Norliza Wan Bakar
Published 2018“…Unfortunately, the logical reasoning among UiTM students in computer problem solving usually results in high failure rates. …”
Get full text
Get full text
Get full text
Article -
19
-
20
