Search Results - (( programming using random algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1

    Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini by Saarini, Jumaliah

    Published 2006
    “…The way to solve this problem, we applied the existed method in visual C++ programming with used the Random midpoint Displacement (RMD) algorithm. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Security analysis of blowfish algorithm by Al-Abiachi, Ashwak M., Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits.In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient.In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient.We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7

    A random search based effective algorithm for pairwise test data generation by Sabira, Khatun, K. F., Rabbi, Che Yahaya, Yaakub, Klaib, Mohammad F. J.

    Published 2011
    “…Java program has been used to test the performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
    Proceedings Paper
  9. 9
  10. 10

    Automated path testing using the negative selection algorithm by Shayma Mustafa Mohi-Aldeen, Radziah Mohamad, Safaai Deris

    Published 2017
    “…The proposed algorithm has been applied to the most commonly used benchmarking program which is triangle classifier. …”
    Get full text
    Get full text
    Indexed Article
  11. 11

    Analysis the components of SNOW 3G and ZUC ciphers in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2018
    “…Software programs of these ciphers and NIST (SP 800-22) tests adopted to assess the randomness properties. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…Using a different initial point, all of them produced the correct results …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    GPS boundary navigation of DrosoBots using MATLAB simulation by Zainal Abidin, Zulkifli, Ngah , Vmi Kalthum, Arshad, Mohd Rizal, Kok , Chee Hou

    Published 2010
    “…The results from the experiment show that the Levy flight algorithm is more suitable to be used compared to normal random. …”
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    The impact of virtual reality on programming algorithm courses on student learning outcomes by Dewi, Ika Parma, Ambiyar, Effendi, Hansi, Giatman, Muhammad, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…Therefore, learning with VR effectively improves student learning outcomes on programming algorithm materials. Other researchers can conduct further research to explore and investigate the impact of VR on health and the use of remote learning.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. The Simplex algorithm has three stages of computation namely initialization, iterative calculation and termination. …”
    Get full text
    Get full text
    Get full text
    Thesis