Search Results - (( party's application based algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- party's application »
- application based »
- implication based »
- java implication »
-
1
-
2
-
3
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
New Diffie Hellman key exchange primitive based upon binary field
Published 2013Get full text
Get full text
Get full text
Article -
7
-
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
-
10
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The open-source nature of mobile platforms has facilitated the development of third- party mobile applications, but it has also created an environment for mobile malware to thrive. …”
Get full text
Get full text
Thesis -
11
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
Published 2005“…This algorithm is based on the combination of Fibonacci permutation and discrete wavelet transforms (DWT). …”
Get full text
Get full text
Thesis -
12
-
13
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
14
-
15
Development of a Negotiation Support Model for Value Management in Construction
Published 2009Get full text
Get full text
Final Year Project -
16
-
17
Impatient job scheduling under cloud computing
Published 2012“…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
Get full text
Get full text
Thesis -
18
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The study findings indicate that the suggested Certainty Factor method is more suited for use in embedded systems or web-based applications, however it is constrained by low processing.…”
Get full text
Get full text
Get full text
Article -
19
Application Of The Blockchain Technology Within Healthcare
Published 2021“…The idea of the EMR framework with the blockchain-based application and database system is developed. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
