Search Results - (( key selection process algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The selection algorithms can perform multiple selections concurrently to find multiple target keys with different predefined target ranks. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Statistical fixed range multiple selection algorithm for peer-to-peer system by Kweh, Yeah Lun, Othman, Mohamed, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2010
    “…The selection algorithm can performs multiple selections concurrently to find multiple target keys with different predefined target ranks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Static range multiple selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2011
    “…The selection algorithm can performs multiple selections concurrently to find multiple target keys with different predefined target ranks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  6. 6

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The second component is asymmetric encryption (RSA) with client’s key pair generator. This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
    Get full text
    Get full text
    Article
  8. 8

    Statistical selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun

    Published 2008
    “…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. Loo et. al. (2002) has proposed a statistical selection algorithm with the same objective and run in multicast / broadcast environment that has been proved that it is the best among others in terms of the number of messages needed to complete the searching process. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Enhancing The Randomness Of Symmetric Key Using Genetic Algorithm by Zakaria, Afiqah Zahirah, Ramli, Sofia Najwa, Wen, Chuah Chai, Mohd Foozy, Cik Feresa, Palaniappan, P. Siva Shamala, Othman, Nur Fadzilah

    Published 2019
    “…Due to natural selection of GA process, the generated key is found to be the most random and non-repeating as possible. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization by Kamal Z., Zamli, Abdul Kader, ., Fakhrud Din, ., Alhadawi, Hussam S.

    Published 2021
    “…To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. This paper introduces a new variant of a metaheuristic algorithm based on Tiki-Taka algorithm, called selective chaotic maps Tiki-Taka algorithm (SCMTTA). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Classification of herbs plant diseases via hierarchical dynamic artificial neural network by Abdullah, Lili Nurliyana, Khalid, Fatimah, Borhan, N.M.

    Published 2010
    “…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
    Get full text
    Get full text
    Article
  17. 17

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…The model performance experiences a significant boost through the GA-optimised feature selection by reducing computational complexity and improving key metrics such as accuracy, precision and F1-score. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…Normal Correlation (NC), Modified Principal Component Analysis (PCA) and Partial Correlation Analysis (PCorrA) are used to develop the correlation coefficients between selected key process variables and quality variables of interest. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20