Search Results - (( java implementation level algorithm ) OR ( programming teaching selection algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  6. 6

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…We produced in total 10 lesson games to illustrate variables, swapping, arrays, sorting algorithm particularly bubble sort, quicksort, selection sort, graph theory, dynamic programming, amortized analysis and trees. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis by Nor Iqbal, Mohd Sait, Noor'ain, Aini, Kartinah, Zen

    Published 2023
    “…Between 2017 and 2020, the Faculty of Computer Science and Information Technology (FCSIT), UNIMAS conducted teaching certificate program for teachers, and outreach program based on digital making, programming, and robotics for students to increase their readiness in digital knowledge through computational thinking and computer science (CTCS). …”
    Get full text
    Get full text
    Get full text
    Proceeding
  15. 15

    Computational Thinking Through Unplugged Programming Activities : Exploring Students’ Learning Experiences by Lim, Bih Loong

    Published 2019
    “…Based on their pre-test and post-test results, nine of them were selected for individual interview. The result shows that there is no significant effect of the learning material in increasing the participants’ algorithm skill. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Selecting quality initial random seed for metaheuristic pproaches: a case of timetabling problem by Md Sultan, Abu Bakar, Mahmod, Ramlan, Sulaiman, Md. Nasir, Abu Bakar, Mohd Rizam

    Published 2008
    “…The University Course Timetabling Problems (UCTP) deals with the scheduling of the teaching program. Metaheuristic techniques have been very successful in a wide range of timetabling problem including UCTP. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…Complementary K-Means clustering grouped the data into two major clusters, indicating that a clear differentiation between economic-based and entrepreneurship-based courses in terms of student enrolment volume and approval distribution. Attribute selection through Information Gain Attrite Evaluation model highlighted Program Code, Course Code and Type of Course as the strongest predictors of course approval and demand levels. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20