Search Results - (( _ application towards algorithm ) OR ( code applications ((a algorithm) OR (bat algorithm)) ))*

Refine Results
  1. 1
  2. 2

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in Aalgorithm and its implementation in real-world application. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Motion estimation in video compression process is computationally intensive for video encoder that involve a large percentage of processing time. Block Matching Algorithm (BMA) is a technique used to minimize the computational complexity of motion estimation in video coding application. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges by John Deutero, Kisoi, Norfadzlan, Yusup, Syahrul Nizam, Junaini

    Published 2025
    “…This systematic review examines the application of these algorithms in HAR by analyzing relevant literature published between 2019 and 2024. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    GREEN protocol: gradient based energy efficient routing with network coding capacity by Nawaz, F., Jeoti, V.

    Published 2016
    “…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
    Get full text
    Get full text
    Article
  18. 18

    GREEN protocol: gradient based energy efficient routing with network coding capacity by Nawaz, F., Jeoti, V.

    Published 2016
    “…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
    Get full text
    Get full text
    Article
  19. 19

    GREEN protocol: gradient based energy efficient routing with network coding capacity by Nawaz, F., Jeoti, V.

    Published 2016
    “…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
    Get full text
    Get full text
    Thesis