Search Results - (( _ application tools algorithm ) OR ( based applications security algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen by Dai , Zhen

    Published 2019
    “…Based on the atmospheric physical model, this research proposed a haze removal algorithm using improved restoration model based on dark channel prior, which has good robustness to the bright sky regions, and also has a good effect on the edges. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An optimal tasks scheduling algorithm based on QoS in cloud computing network by Alhakimi, Mohammed Ameen Mohammed Abdo

    Published 2017
    “…Therefore, if the resource is from the first group then map the average length task to it and if the choosing resource is from the second group, then map the largest length task to it. The simulation tool used for testing the algorithm is WorkflowSim. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Real-time power system dynamic security assessment based on advanced feature selection for decision tree classifiers by Al-Gubri, Qusay, Mohd Ariff, Mohd Aifaa

    Published 2017
    “…This paper proposed a novel algorithm based on advanced feature selection technique for decision tree (DT) classifier to assess the dynamic security in power system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…Finally, a software tool based on an adaptive neural network for power system security assessment was developed. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…Secondly, the application and modification of a Jaya algorithm to deal with different OPF problems is presented. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20