Search Results - (( java implication based algorithm ) OR ( data identity through algorithm ))
Search alternatives:
- implication based »
- through algorithm »
- java implication »
- data identity »
-
1
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
Get full text
Get full text
Get full text
Article -
2
A tool for addressing construct identity in literature reviews and meta-analyses
Published 2016“…Discordant naming of constructs is here termed the construct identity fallacy (CIF). We designed and evaluated the construct identity detector (CID), the first tool with large-scale construct identity detection properties and the first tool that does not require respondent data. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
Get full text
Get full text
Thesis -
8
Embedded PC based wireless communication using XTEA
Published 2010“…When data is entered in one of the PC, the PIC18F14K50 microcontroller encrypts the data before it is transmitted wirelessly from one PC to another through the XTend OEM RF modules. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. …”
Get full text
Get full text
Get full text
Article -
10
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
11
Improving parallel self-organizing map using heterogeneous uniform memory access / Muhammad Firdaus Mustapha
Published 2018“…Self-organizing Map (SOM) is a very popular algorithm that has been used as clustering algorithm and data exploration. …”
Get full text
Get full text
Thesis -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations
Published 2022“…The gradient descent optimization algorithm was observed to help improve the modelâ��s performance. …”
Get full text
Get full text
Article -
14
Classification Analysis Of The Badminton Five Directional Lunges
Published 2018“…On selective attribute configuration, the identity (ID), game reaction time (GT) and type of lunge (LT) significantly enhanced the classification accuracy to 99.61% for experimental data-USM and 100% for the public data-SEA. …”
Get full text
Get full text
Monograph -
15
Removing impulse noise images by using decision tree algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
16
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
Get full text
Get full text
Thesis -
17
Dynamics and control of underactuated systems with applications in robotics / Ahmad Azlan Mat Isa … [et al.]
Published 2011“…The generality and efficiency of the proposed algorithm are demonstrated through simulations of an under-actuated robot manipulator, finally the obtained results were verified experimentally.…”
Get full text
Get full text
Research Reports -
18
Attendance management system with half-covered and full-facial recognition feature
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Knowledge Discovery Of Noise Level In Lecture Rooms
Published 2018“…Recorded audio data will go through data pre-processing for outlier and extreme value screening. …”
Get full text
Get full text
Monograph -
20
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…The voltage normalization algorithm has reduced the output voltage variations from 26 data/minute to 17 data/minute with the elimination of pre-calibration each time before use. …”
Get full text
Get full text
Thesis
