Search Results - (( java implication based algorithm ) OR ( data identity through algorithm ))

Refine Results
  1. 1

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A tool for addressing construct identity in literature reviews and meta-analyses by Larsen, Kai Rune T., Bong, Chih How

    Published 2016
    “…Discordant naming of constructs is here termed the construct identity fallacy (CIF). We designed and evaluated the construct identity detector (CID), the first tool with large-scale construct identity detection properties and the first tool that does not require respondent data. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Embedded PC based wireless communication using XTEA by Khok, Jess Lyn

    Published 2010
    “…When data is entered in one of the PC, the PIC18F14K50 microcontroller encrypts the data before it is transmitted wirelessly from one PC to another through the XTend OEM RF modules. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10
  11. 11

    Improving parallel self-organizing map using heterogeneous uniform memory access / Muhammad Firdaus Mustapha by Mustapha, Muhammad Firdaus

    Published 2018
    “…Self-organizing Map (SOM) is a very popular algorithm that has been used as clustering algorithm and data exploration. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Classification Analysis Of The Badminton Five Directional Lunges by Ho, Zhe Wei

    Published 2018
    “…On selective attribute configuration, the identity (ID), game reaction time (GT) and type of lunge (LT) significantly enhanced the classification accuracy to 99.61% for experimental data-USM and 100% for the public data-SEA. …”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamics and control of underactuated systems with applications in robotics / Ahmad Azlan Mat Isa … [et al.] by Mat Isa, Ahmad Azlan

    Published 2011
    “…The generality and efficiency of the proposed algorithm are demonstrated through simulations of an under-actuated robot manipulator, finally the obtained results were verified experimentally.…”
    Get full text
    Get full text
    Research Reports
  18. 18
  19. 19

    Knowledge Discovery Of Noise Level In Lecture Rooms by Tang, Jau Hoong

    Published 2018
    “…Recorded audio data will go through data pre-processing for outlier and extreme value screening. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Improved static and dynamic FBG sensor system for real-time monitoring of composite structures by Vorathin, Epin

    Published 2017
    “…The voltage normalization algorithm has reduced the output voltage variations from 26 data/minute to 17 data/minute with the elimination of pre-calibration each time before use. …”
    Get full text
    Get full text
    Thesis