Search Results - (( java implication based algorithm ) OR ( software programmes new algorithm ))
Search alternatives:
- software programmes »
- implication based »
- java implication »
- programmes new »
- new algorithm »
-
1
RISC-V instruction set extension on blockchain application
Published 2024“…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…However, the new technology is not free from new security concerns. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This method also enables us to design the controller to work as PDFLC, PIFLC or PIDFLC depending on two (one-bit) external signals with programmable fuzzy sets and programmable rule table using VHDL language for implementation on FPGA device, and to employ the new technique of fuzzy algorithm in order to serve a wide range of the physical systems which require a real-time operation. …”
Get full text
Get full text
Get full text
Article -
7
Hardware implementation of RC4A stream cipher
Published 2009“…Implementation of cryptographic algorithms on hardware runs faster than on software and at the same time offering more intrinsic security. …”
Get full text
Get full text
Get full text
Article -
8
Development of oil palm fresh fruit bunch maturity assessment software for personal digital assistant
Published 2011“…The software allows the user to take a picture from the FFBs using the built-in camera of the PDA and analyze it inside the PDA using a wisely implemented Hue based image processing algorithm. …”
Get full text
Get full text
Thesis -
9
Enhancing understanding of programming concepts through physical games
Published 2017“…There are many approaches in teaching programming such as through application software on line and offline, through software application games) and physical activities such as board games, dancing and computational thinking activities. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Design and development of high performance swa cell design for local DNA sequence alignment
Published 2017“…This study proposed three new DNA sequence alignment accelerator system cell design and architecture based on the Smith-Waterman Algorithm (SWA) named as the new Optimized SWA Linear Gap Penalty (OSL), Optimized SWA Affine Gap Penalty (OSA), and Optimized Recursive Variable Expansion SWA Linear Gap Penalty (ORSL). …”
Get full text
Get full text
Thesis -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…Therefore a study was conducted to introduce a new algorithm to inspect integrated circuit package markings. …”
Get full text
Get full text
Thesis -
14
-
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. Hence, there is a need for development of techniques and schemes to obfuscate sensitive parts of software to protect it from reverse engineering attacks. …”
Get full text
Get full text
Thesis -
16
Smart final year project archive system using laravel framework with email notification (SFYPAS) / Abidah Mat Taib
Published 2020“…For future work, the system can be improved by adding a search engine that implements any searching algorithm to yield better results.…”
Get full text
Get full text
Get full text
Article -
17
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…It statically detects when the data comes from tainted sources, when they are stored in the back-end database, and when they are retrieved later in another point to build a new SQL statement without proper sanitisation. This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis
