Search Results - (( _ application ((a algorithm) OR (new algorithm)) ) OR ( code application towards algorithm ))*
Search alternatives:
- towards algorithm »
- code application »
- new algorithm »
- a algorithm »
-
1
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
2
-
3
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…On extracting the desired features, a new automation of feature extraction using Depth First Search (DFS) with sequential search are introduced and succeed to extract the targeted features with consideration of no limitation on application file size also no limitation on file number. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…© 2015, Springer Science+Business Media New York.…”
Get full text
Get full text
Article -
6
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…© 2015, Springer Science+Business Media New York.…”
Get full text
Get full text
Article -
7
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…© 2015, Springer Science+Business Media New York.…”
Get full text
Get full text
Article -
8
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in A • algorithm and its implementation in real-world application. …”
Get full text
Get full text
Thesis -
9
Challenges in multi-layer data security for video steganography
Published 2018Get full text
Get full text
Get full text
Article -
10
-
11
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
15
A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges
Published 2025“…This systematic review examines the application of these algorithms in HAR by analyzing relevant literature published between 2019 and 2024. …”
Get full text
Get full text
Get full text
Article -
16
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
18
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
19
-
20
Towards designing a blockchain-based model for e-book publishing
Published 2025“…To provide a systematic synthesis of prior works, this paper develops a taxonomy of blockchain-based ebook publishing models across six dimensions: platform, storage, smart contract usage, cryptographic algorithm, tokenization, and actors. …”
Get full text
Get full text
Get full text
Article
