Search Results - (( _ application towards algorithm ) OR ( code applications ((a algorithm) OR (bat algorithm)) ))*
Search alternatives:
- towards algorithm »
- code applications »
- bat algorithm »
- a algorithm »
-
1
A Bat-inspired Strategy for Pairwise Testing
Published 2015Get full text
Get full text
Get full text
Article -
2
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in A • algorithm and its implementation in real-world application. …”
Get full text
Get full text
Thesis -
3
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Motion estimation in video compression process is computationally intensive for video encoder that involve a large percentage of processing time. Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
Get full text
Get full text
Thesis -
4
Challenges in multi-layer data security for video steganography
Published 2018Get full text
Get full text
Get full text
Article -
5
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
9
A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges
Published 2025“…This systematic review examines the application of these algorithms in HAR by analyzing relevant literature published between 2019 and 2024. …”
Get full text
Get full text
Get full text
Article -
10
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
11
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
13
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
Towards designing a blockchain-based model for e-book publishing
Published 2025Get full text
Get full text
Get full text
Article -
16
-
17
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
Get full text
Get full text
Article -
18
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
Get full text
Get full text
Article -
19
GREEN protocol: gradient based energy efficient routing with network coding capacity
Published 2016“…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
Get full text
Get full text
Article -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis
