Search Results - (( _ application new algorithm ) OR ( code application towards algorithm ))*
Search alternatives:
- towards algorithm »
- code application »
- application new »
- new algorithm »
-
1
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
2
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…The proposed algorithm improves the lifetime of industrial wireless mesh and star mesh networks. …”
Get full text
Get full text
Article -
6
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…The proposed algorithm improves the lifetime of industrial wireless mesh and star mesh networks. …”
Get full text
Get full text
Article -
7
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…The proposed algorithm improves the lifetime of industrial wireless mesh and star mesh networks. …”
Get full text
Get full text
Article -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
9
-
10
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
11
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Late Acceptance Hill Climbing Based Strategy for Test Redundancy Reduction and Prioritization
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Challenges in multi-layer data security for video steganography
Published 2018Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis
