Search Results - (( basic data protection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin by Engku Safruddin, Engku Maryam Syahdina

    Published 2018
    “…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    CHAOS BASED BLOCK ENCRYPTOR by SARIN, FARHANA

    Published 2008
    “…This project is basically a block encryption to protect block of data. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Development of Lightning Protection System (LPS) Designing Tool by Idris, Samueil

    Published 2015
    “…Based on this standard, the data and mathematical equations were obtained to form algorithms whereby it would be used in the software afterwards. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    NUMERICAL DIRECTIONAL OVERCURRENT PROTECTION FOR POWER DISTRIBUTION NETWORK by AHMAD, MUHAMMAD NURULDIN

    Published 2007
    “…Some studies have been made to identify several types offaults related to the systems proposed. Every protection systems have three basic components: instrument transformers, relays and circuit breakers. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    Robust Image Watermarking Theories and Techniques: A Review by Jasni, Mohamad Zain, Tao, Hai, Chongmin, Li, Abdalla, Ahmed N.

    Published 2014
    “…Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…The coding is designed in a way that there is an attack of malicious to destroy the data. Because there is a machine-learning scheme in the security, the system have done automatically protect the data and hence the data is recovered at the end of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching by Ei Wei., Ting, M. Z., Ibrahim, D.J., Mulvaney

    Published 2017
    “…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Financial advisory and management system by Low, Xin Yin

    Published 2025
    “…Basic goal tracking functionality is implemented on the Goal Page, with plans to integrate the Days Needed Calculation Algorithm for real-time progress tracking in future iterations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Analysis of watermarking techniques in video by Shojanazeri, Hamid, Wan Adnan, Wan Azizun, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Saripan, M. Iqbal

    Published 2011
    “…Basically digital watermarking involves embedding secret symbols known as watermarks within video data which can be used later for copyright detection purposes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Artificial Intelligence as A Common Heritage of Mankind by Wye, Dennis Keen Khong, Su, Wai Mon

    Published 2023
    “…The potential application of open access and open data licensing is discussed. The history of the common heritage of mankind is covered, and the potential benefit of recognizing basic artificial intelligence components as a common heritage of mankind is explored. …”
    Get full text
    Get full text
    Get full text
    Article