Suggested Topics within your search.
Suggested Topics within your search.
Computers
4
Word processing
2
CD-ROMS
1
Computer programs
1
Computer software
1
Electronic data processing
1
Intel 8086 (Microprocessor)
1
Intel 8088 (Microprocessor)
1
Juvenile literature
1
Microprocessors
1
Performance
1
Popular works
1
Problems, exercises, etc
1
SYS mark 32 (Computer program
1
Software
1
Testing
1
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8“… and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte to byte…”
Get full text
Get full text
Get full text
-
9by Ong, Kah Siang“… according to the input. The output is generated according to the size of byte (beat per minute) and shall…”
Published 2010
Get full text
Get full text
Get full text
-
10“… for header detection is not much discussed. In this paper, we introduce three novel algorithms; single-byte…”
Get full text
Get full text
Get full text
-
11“… from Android applications byte-code through static code analysis, selected and were used to train…”
Get full text
Get full text
Get full text
-
12“… applications byte-code through static code analysis, selected and were used to train supervised classifiers…”
Get full text
Get full text
Get full text
-
13by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri“… is linear, hence the response time is considered good. Performance evaluations based on hit rate and byte…”
Published 2016
Get full text
Get full text
Get full text
Get full text
-
14“…) system). The "Dynamic Cryptography Buffer (DCB)" has been implemented that contains 56 bytes from total…”
Get full text
Get full text
Get full text
Get full text
-
15by Muhamad Aiman, Muhamad Azmi“… with 25,264 bytes compared to the Arduino-Simulink implementation that required 56,300 bytes. In addition…”
Published 2016
Get full text
Get full text
Get full text
Get full text
Get full text
-
16by Baharuddin, Muhamad Syuhaimi“… the possibility of the attack, we replace the user password with 30 bytes random characters as the passwords…”
Published 2004
Get full text
-
17by Gran, Badshah, Liew, Siau-Chuin, Jasni, Mohamad Zain, Syifak Izhar, Hisham, Amatul, Zehra“… was found 86% better than other tabulated techniques. Compression ratio and more bytes reduction were…”
Published 2015
Get full text
Get full text
Get full text
-
18by Mat Nayan, Norshita“… language representation. Image compression is minimizing the size in bytes of a graphics file without…”
Published 2005
Get full text
Get full text
-
19by Zainudin, Afdal Shahizad“… magazine featuring fresh materials, quick bytes and news briefs on celebrities and sports personalities…”
Published 2007
Get full text
Get full text
-
20by Mustafa, Nazih Shaban, Kashmola, Muhanad Ali Hamdon, Mustafa Al-Ahmad, Basma Ezzat“… that computers recognize bits and bytes. Essentially, a digital image is just a long string of 1s and 0…”
Published 2012
Get full text
Get full text
Get full text