Search Results - (( using practical new algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…This research describes a new approach for interference cancellation using an analog algorithm that adopts a new method to determine good tradeoff between the complexity and the convergence speed for optimum results. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH by Siti Roslindar, Yaziz, Roslinazairimah, Zakaria

    Published 2018
    “…The study of the multistep ahead forecast is significant for practical application purposes using the proposed statistical model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    CSC669 - Cryptographic Algorithms / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics and Media

    Published 2021
    “…This course will be blend of theory and practice, covering standardized cryptosystems widely used in practice without sacrificing rigor or an emphasis on foundations. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  6. 6

    CSC669: Cryptographic Algorithms / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2018
    “…This course will be blend of theory and practice, covering standardized cryptosystems widely used in practice without sacrificing rigor or an emphasis on foundations. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  7. 7

    Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering by He, Yanfang

    Published 2024
    “…To address this issue, this study incorporated joint graph learning from the gmc algorithm into swmcan, creating a new algorithm called swmcan-jg. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Application of Krylov Subspace methods for solving Continuous Power Flow problem in voltage stability analysis of power system by Jasni, Jasronita

    Published 2010
    “…Furthermore, the real data with 293 buses and 595 lines is used as a practical system for verification of the new algorithms The results show that these new algorithms are able to eliminate the convergence problem faced by the existing CPF algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…The codes of the scripting language are shown to easily use, concisely describe the algorithm in a directly publishable form and flexible for new problem creations. …”
    Get full text
    Get full text
    Thesis
  12. 12

    New Quasi-Newton Equation And Method Via Higher Order Tensor Models by Gholilou, Fahimeh Biglari

    Published 2010
    “…By using a new equation, the BFGS method is modified. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. However, the high-dimensional continuous chaotic has increased the algorithm’s complexity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment
  14. 14
  15. 15

    A discrete simulated kalman filter optimizer for combinatorial optimization problems by Suhazri Amrin, Rahmad

    Published 2022
    “…Due to the limitation of the SKF algorithm which only able to operate in continuous search space, the proposed algorithm makes use of a new interpretation that incorporates mutation and Hamming distance, allowing the proposed algorithm to function in discrete search space. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…Consequently, the practical applicability of the NLFXLMS algorithm is limited by this drawback. …”
    Get full text
    Get full text
    Thesis