Search Results - (( programming using normalization algorithm ) OR ( java data protection algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…I used different types of optimization algorithms to improve the performance of the neural networks. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Statistical approach on grading: mixture modeling by Md. Desa, Zairul Nor Deana

    Published 2006
    “…The Gibbs sampler algorithm is applied using the WinBUGS programming package. …”
    Get full text
    Get full text
    Thesis
  16. 16

    GPS boundary navigation of DrosoBots using MATLAB simulation by Zainal Abidin, Zulkifli, Ngah , Vmi Kalthum, Arshad, Mohd Rizal, Kok , Chee Hou

    Published 2010
    “…The results from the experiment show that the Levy flight algorithm is more suitable to be used compared to normal random. …”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Calculation of normalized input admittance for dielectric measurements of lossy materials (software development) / Mohamad Rizal Maarof by Maarof, Mohamad Rizal

    Published 1996
    “…In this project,we describe a computer program using FORTRAN 77 for calculation of input admittance of a smaller waveguide radiating into a larger waveguide. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi -Objective Economic Dispatch Using Evolutionary Programming by Noor Azlan Bin Adnan

    Published 2023
    “…The designated algorithm of MOEP used MATLAB to run the simulations. …”
  19. 19
  20. 20

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
    Get full text
    Get full text
    Thesis