Search Results - (( java information method algorithm ) OR ( program implementation _ algorithm ))

Refine Results
  1. 1

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Feedback given to the user to inform them of methods by which they can improve their plant’s health condition, derived through the information generated from the data-mining module. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. Likewise, the widely used standard verification simulation tool AVISPA is used to verify that the scheme is secure against passive and active attacks. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…One of the crucial usages is internet crawling to find the best information using keywords. The searching algorithm has been one of the famous algorithm which is used throughout most of the existing software, such as Google, Facebook, Twitter. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Implementation of autonomous vehicle navigation algorithms using event-driven programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers