Search Results - (( program wave optimization algorithm ) OR ( java feature encryption algorithm ))
Search alternatives:
- feature encryption »
- wave optimization »
- program wave »
- java »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
3
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
4
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
5
Combined Effect Of Incidence - Forebody Angles on the Flow Structure Inside Spiked Supersonic Intakes
Published 2008“…In house program is built to solve the governing sets of equations by using SIMPLE algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
Development of wwm system using mlnn-ga for ph prediction of water quality in catchment area
Published 2021“…MLNN-GA contain three hidden layers and Genetic Algorithm (GA) will optimize the weight of neural network during the training process. …”
Get full text
Get full text
Thesis -
7
VHF adaptive antenna using a rear defogger
Published 2012“…This algorithm is maximized the correlation coefficients. …”
Get full text
Get full text
Thesis
