Search Results - (( mobile evaluation means algorithm ) OR ( related information security algorithm ))

Refine Results
  1. 1

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…This block cipher is suitable to be applied to small devices such as mobile phones and PDAs. The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  2. 2

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…The evaluation methods were Root Mean Square Error and Mean Absolute Error. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation by Altag Ali, Gassan, Jeoti , Varun, Manzoor, Shahid

    Published 2010
    “…The Doppler spread, or evenly, the mobile speed of motion, is an evaluation of the spectral spreading of mobile fading channel. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network by Abdulrazzak H.N., Hock G.C., Mohamed Radzi N.A., Tan N.M.L., Kwong C.F.

    Published 2023
    “…The evaluation process was implemented on RK-Means, K-Means++, and OK-Means models. …”
    Article
  6. 6
  7. 7

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…Cryptography requires a secure technique to ensure that the enemy is prevented while securing legitimate users gaining access to information. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…This evaluation is done by means of simulation using NS-2 developed by University California Berkeley. …”
    Get full text
    Get full text
    Thesis
  9. 9

    MOBILE DICTIONARY by Ibrahim, Siti Nabilah

    Published 2005
    “…The output of this system will be evaluated by users who already have experienced in using existing electronic dictionaries based on MobileDic accuracy as well as its usefulness. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
    Article
  12. 12
  13. 13

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Design and evaluation on adaptive fuzzy speed control of mobile robot by Abdollahi, Mohammadreza

    Published 2011
    “…Both data acquisition and control algorithm are developed by using LabVIEW. A four-wheel mobile robot, PUTRABOT2, is used to conduct the experiments. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  16. 16

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Ismail, Mohd Norasri

    Published 2019
    “…Thus, QoE can be improved. To evaluate EnVADE algorithm in term of energy efficiency, an experimental evaluation has been done. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone by Abd Rahim, Mohd Hilmi Izwan

    Published 2019
    “…Thus, QoE can be improved. To evaluate EnVADE algorithm in term of energy efficiency, an experimental evaluation has been done. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Automated call receiving and forwarding mechanism for supporting integrated disaster management system by Khamis, N.A., Chin Yang, L., Nordin, A.

    Published 2014
    “…The efficiency of the algorithm is evaluated by comparing the response time of the current procedures with the implementation of the algorithm in the proposed prototype. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Multicast-Based Mobile Ipv6 Join/Leave Mechanism Software by A.M. Ali, Sahar

    Published 2003
    “…Although it is not yet standardized, every IPv6 node is required to implement Mobile IPv6, which means that mobility must be widely supported. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone by Md Jamal, Norezmi

    Published 2022
    “…Results from TIMIT dataset revealed that average STOI scores for the joint algorithm are higher than those of DNN, conventional HRNR and Log Minimum Mean Square Error (Log-MMSE) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis