Search Results - (( process create process algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. Conclusion: Random process employed in this block cipher increased confidentiality of the message and dynamic length substitution in proposed algorithm may lead to maximum cryptographic confusion and consequently makes it difficult for cryptanalysis.…”
    Get full text
    Get full text
    Article
  2. 2

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…We used to insure for the users data and files in our website by checking the process of our generated system (SCDS) and we got match results for the same files in case of encryption and decryption process.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Enhancement processing time and accuracy training via significant parameters in the batch BP algorithm by Fatma Susilawati, Mohamad, Mumtazimah, Mohamad, Sarhan, AlDuais

    Published 2020
    “…The average accuracy training is 0.9909 and average processing time improved of dynamic algorithm is 430 times faster than the BBP algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The authors introduce Integrative Information Management Architecture (IIMA) running on collaboration algorithms which create semi automated intermediary processes to support management team address integration challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing by Ilias, Izzah Nadhilah

    Published 2022
    “…This project has successfully created an algorithm that can identify the type of printing process and convert CAD file to STL file automatically. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Enhancement of stemming process for malay illicit web content by Noor Fatihah , Mazlam

    Published 2012
    “…Hence, the errors from both stemming algorithm were analyzed. Few features were created to encounter the problems occurred in existing stemming algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    To study the multi-objective optimization of EDM using genetic algorithm by Fairuz, Idris

    Published 2013
    “…EDM is one of the most accurate manufacturing processes for creating geometric shapes whether complex or simple in parts and assemblies. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Multicolour object detection using multithreading by Saaidon, Nur'Ain, Sediono, Wahju

    Published 2015
    “…Algorithm with multithreading approached is compared to the usual sequential approach of image processing. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    Frequent itemset mining using graph theory / Mohammad Arsyad Mohd Yakop by Mohd Yakop, Mohammad Arsyad

    Published 2017
    “…This research aims to speed up the searching process by creating relevant edges in the graph to reduce the search space by rearranging the items using the common prefix rowset.…”
    Get full text
    Get full text
    Thesis
  12. 12

    An improved Levenshtein algorithm for spelling correction word candidate list generation by Abdulkhudhur, Hanan Najm

    Published 2016
    “…Experimental results show that the proposed algorithm outperforms Levenshtein algorithm in terms of the processing time by 36.45% while the accuracy of both algorithms is still the same.…”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Statistical approach toward achieving green cloud computing in virtualized single server environment / Mohd Badrulhisham Ismail by Ismail, Mohd Badrulhisham

    Published 2020
    “…The aim of this thesis is to create a multiple algorithm, which run on a single server, with a low power consumption and a stable process. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…Fuzzy rule is a form of a fuzzy condition and membership function is a generality of indicator function in classical sets. In order to create parameters, there are many problems arise in the process of fuzzy modeling. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Underwater Image Recognition using Machine Learning by Divya, N.K., Manjula, Sanjay Koti, Priyadarshini, S

    Published 2024
    “…It encompasses the procedure for feeding algorithms information to create the algorithms realize patterns in the data and then increase the performance of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Parallel processing and matrix convolution inside wavelet transform process is the most prominent study in this research. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Weighted Watson-crick automata and applications in halal authentication by Mohd Tamrin, Mohd Izzuddin, Turaev, Sherzod, Che Azemin, Mohd Zulfaezal

    Published 2016
    “…Our investigations have created new theorems and algorithms used in the design of automated halal authentication tools. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…The aim of this paper is to create awareness on the importance of cryptanalysis when designing cryptographic algorithms. …”
    Get full text
    Conference or Workshop Item
  20. 20

    Nonlinear Local-pixel-shifting Color Constancy Algorithm by Wan Muhammad Syahrir, Wan Hussin, Mohd Naim, Mohd Jain Noordin, Nor Ashidi, Mat Isa

    Published 2018
    “…Most color constancy algorithms implement a color correction process that performs globally for the entire input pixel image. …”
    Get full text
    Get full text
    Get full text
    Article