Search Results - (( java implementation 5s algorithm ) OR ( using automatic encryption algorithm ))
Search alternatives:
- automatic encryption »
- java implementation »
- implementation 5s »
- 5s algorithm »
-
1
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
2
Encryption function on artificial neural network
Published 2016“…Six algorithms that design secrecy keys are used for digital image encryption. …”
Get full text
Get full text
Article -
3
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
6
-
7
-
8
-
9
-
10
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
11
-
12
Lightweight authentication technique for secure communication of edge/fog data-centers
Published 2020“…The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. …”
Get full text
Get full text
Article -
13
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
14
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
15
Secured HF image transmission system
Published 2006“…For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR) and a nonlinear combining function. …”
Get full text
Get full text
Monograph -
16
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
19
-
20
