Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Depart...
| Main Author: | Shuwandy, Moceheb Lazam |
|---|---|
| Format: | Dissertation |
| Language: | English English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2946/1/Moceheb_Lazam_Shuwandy.pdf https://etd.uum.edu.my/2946/4/Moceheb_Lazam_Shuwandy.pdf https://etd.uum.edu.my/2946/ |
| Abstract | Abstract here |
Similar Items
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Masked face detection system using google firebase
by: Azman, Anis Zahirah
Published: (2021)
by: Azman, Anis Zahirah
Published: (2021)
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010)
by: Ghayab, Hadi Ratham
Published: (2010)
An enhanced anycast routing protocol using nearest PIM-SM tree distribution with load-balancing scheme / Jimmy Tan Kai Hong.
by: Tan, Jimmy Kai Hong
Published: (2003)
by: Tan, Jimmy Kai Hong
Published: (2003)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
The Impact of Missing Value Methods and Normalization Techniques on the Performance of Data Mining Models
by: Munirah, Yahya
Published: (2011)
by: Munirah, Yahya
Published: (2011)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Optimized feature construction methods for data summarization methods for data summarization of relational data
by: Florence Sia, Fui Sze
Published: (2014)
by: Florence Sia, Fui Sze
Published: (2014)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Digital Image Watermarking Using LSB Method
by: ., Maulidin
Published: (2011)
by: ., Maulidin
Published: (2011)
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
by: Jia, Liu
Published: (2024)
by: Jia, Liu
Published: (2024)
Test data generation method for dynamic - structural testing in automatic programming assessment
by: Sarker, Md. Shahadath
Published: (2016)
by: Sarker, Md. Shahadath
Published: (2016)
An analysis of enhanced lossless compression methods for road map images / Ng Choon Boon
by: Ng, Choon Boon
Published: (2003)
by: Ng, Choon Boon
Published: (2003)
Invariants generation for method overriding using abstract interpretation / Siti Hafizah Ab. Hamid
by: Ab. Hamid, Siti Hafizah
Published: (2013)
by: Ab. Hamid, Siti Hafizah
Published: (2013)
An automatic failure recovery method for world-altering composite semantic web services / Hadi Saboohi
by: Saboohi, Hadi
Published: (2013)
by: Saboohi, Hadi
Published: (2013)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)
by: Mehdi , Malekzadeh
Published: (2017)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Designing and Developing an Intelligent Congkak
by: Muhammad Safwan, Mohd Shahidan
Published: (2011)
by: Muhammad Safwan, Mohd Shahidan
Published: (2011)
Performance evaluation of monotone's netsync protocol
by: Hu, Kwong Liik
Published: (2005)
by: Hu, Kwong Liik
Published: (2005)
Developing Time And Attendance System (TAS)
by: Tayfor, Mohammed Fahed
Published: (2008)
by: Tayfor, Mohammed Fahed
Published: (2008)
The Impact of Normalization Techniques on Performance Backpropagation Networks
by: Norlida, Hassan
Published: (2004)
by: Norlida, Hassan
Published: (2004)
Comparative Study on the Performance of Different TCP
Flavors
by: Jama Omar Abdi, Abdulaziz
Published: (2009)
by: Jama Omar Abdi, Abdulaziz
Published: (2009)
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
by: Hammash, Nayif Mohammed
Published: (2012)
by: Hammash, Nayif Mohammed
Published: (2012)
Chatbot development in data representation for diabetes education
by: Abbas Saliimi, Lokman
Published: (2011)
by: Abbas Saliimi, Lokman
Published: (2011)
Developing an Online Student Accommodation Registration in UUM
by: Muhsen, Zaidon Abas
Published: (2011)
by: Muhsen, Zaidon Abas
Published: (2011)
Data Mining Classification Techniques and Performances on Medical Data
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
A study of island network performance for streaming protocols
by: Mohammed, Ammar Hatem
Published: (2019)
by: Mohammed, Ammar Hatem
Published: (2019)
Visualizing Student Performances Using Data Mining Techniques.
by: Sri Banu, Munisamy
Published: (2007)
by: Sri Banu, Munisamy
Published: (2007)
Development if intelligent classifier and estimator for tualang honey purity
by: Norazian, Subari
Published: (2014)
by: Norazian, Subari
Published: (2014)
Utilising Virtual Reality Developing User Manual for Printer
by: See, Yong Look
Published: (2004)
by: See, Yong Look
Published: (2004)
Developing a Prototype of Financial Decision Support System
by: Chee, Hsiao Ling
Published: (2003)
by: Chee, Hsiao Ling
Published: (2003)
Developing Mobile Application For Parliament Election Process in Jordan.
by: Jebreen, Issam Yousef
Published: (2007)
by: Jebreen, Issam Yousef
Published: (2007)
Development Of Teleresearch Model Using Open Source Software
by: Rajendaran, Chellappan Pillai
Published: (2008)
by: Rajendaran, Chellappan Pillai
Published: (2008)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
The performance of soft computing techniques on content-based SMS spam filtering
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
by: Hassan Saeed, Waddah Waheeb
Published: (2015)
Evaluation of Car Rental Reservation/Management System with
Tracking Capability Performance
by: El-Shahawi, Fathi Ali
Published: (2009)
by: El-Shahawi, Fathi Ali
Published: (2009)
A Web-Based Interface For A High Performance Computing System
by: Awad, Mohammed M. I.
Published: (2008)
by: Awad, Mohammed M. I.
Published: (2008)
Development of Design-Oriented Evaluation Tool : A HCI Perspective
by: Suganthi Naikkar, Subramaniam
Published: (2004)
by: Suganthi Naikkar, Subramaniam
Published: (2004)
Similar Items
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004) -
Masked face detection system using google firebase
by: Azman, Anis Zahirah
Published: (2021) -
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010) -
An enhanced anycast routing protocol using nearest PIM-SM tree distribution with load-balancing scheme / Jimmy Tan Kai Hong.
by: Tan, Jimmy Kai Hong
Published: (2003)
