Search Results - (( _ applications a algorithm ) OR ( code application towards algorithm ))*

Refine Results
  1. 1

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in Aalgorithm and its implementation in real-world application. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges by John Deutero, Kisoi, Norfadzlan, Yusup, Syahrul Nizam, Junaini

    Published 2025
    “…This systematic review examines the application of these algorithms in HAR by analyzing relevant literature published between 2019 and 2024. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Towards designing a blockchain-based model for e-book publishing by Mohammadan Makhtar, Maznun Arifa, Admodisastro, Novia, Askarbekkyzy, Suleymenova Laura

    Published 2025
    “…To provide a systematic synthesis of prior works, this paper develops a taxonomy of blockchain-based ebook publishing models across six dimensions: platform, storage, smart contract usage, cryptographic algorithm, tokenization, and actors. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    GREEN protocol: gradient based energy efficient routing with network coding capacity by Nawaz, F., Jeoti, V.

    Published 2016
    “…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
    Get full text
    Get full text
    Article
  16. 16

    GREEN protocol: gradient based energy efficient routing with network coding capacity by Nawaz, F., Jeoti, V.

    Published 2016
    “…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
    Get full text
    Get full text
    Article
  17. 17

    GREEN protocol: gradient based energy efficient routing with network coding capacity by Nawaz, F., Jeoti, V.

    Published 2016
    “…A fundamental challenge in the acceptability of Wireless SAW Sensor Network (WSSN) for industrial applications, is to enhance the lifespan and packet delivery ratio (PDR) of the network. …”
    Get full text
    Get full text
    Article
  18. 18

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20