Search Results - (( java features encryption algorithm ) OR ( program implementation matching algorithm ))
Search alternatives:
- implementation matching »
- program implementation »
- features encryption »
- java features »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Conference paper -
3
-
4
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…First experiment uses exact match, which is no method, is apply. Second experiment uses dynamic programmings apply with Wagner and Fischer algorithm.…”
Get full text
Get full text
Thesis -
5
Selection of prospective workers using profile matching algorithm on crowdsourcing platform
Published 2022“…These criteria become variables that are used in the profile matching algorithm to find workers who best match the profiles offered. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Implementing case-based reasoning approach to framework documentation
Published 2023Conference paper -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
9
-
10
Can recognition using LABVIEW / Jamilah Othman
Published 2008Get full text
Get full text
Student Project -
11
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…The system can provide the team formation and players, and calculate the strength of the KFA team to justify its winning and loss of 2019 FA Cup and Malaysia Cup final matches respectively. This system can help coaches to solve problem regarding the strong team development with available players and motivate the use of decision technologies in sports able to match the results from the real world implementation.…”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
Cyclic redundancy encoder for error detection in communication channels
Published 2004“…This paper describes the methodology used and the implementation of the Cyclic Redundancy Check (CRC) algorithm using Ci+ programming. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016“…The second method is automatic optimization using Genetic Algorithm. That depends on the principle of natural selection as proposed by Darwin The genetic program was coupled with the reservoir flow model to re-evaluate the chosen wells at each iteration until obtaining the optimal choice. …”
Get full text
Get full text
Conference or Workshop Item -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
Get full text
Get full text
Thesis -
19
The Development of Color Based Visual Search Utility
Published 2001“…Finally, a binary search algorithm was used to match and display images requested. …”
Get full text
Get full text
Thesis -
20
An improved Malaysian automatic license plate recognition (M-ALPR) system using hybrid fuzzy in C++ environment
Published 2009“…First, the algorithm to recognize the license plates is presented, by taking advantage of Matlab and C++ programming language benefits in order to increase system efficiency. …”
Get full text
Get full text
Conference or Workshop Item
