Search Results - (( developing alternative encryption algorithm ) OR ( java application tools algorithm ))

Refine Results
  1. 1
  2. 2

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Triangular Coordinate Extraction (TCE) technique has also been introduced to extract the coordinates during the rotation of Hybrid Cube surface (HCs) and plays an important role in the development of KSAHC algorithm. The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4
  5. 5

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…This thesis seeks to study the AAḃ design philosophy and the specifications of the AAḃ asymmetric encryption scheme, develop the AAḃ encryption scheme and evaluate the computational speed, power consumption and feasibility of AAḃ encryption scheme on an embedded system in the practical domain. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Designing New Block Cipher Based On Genetic Algorithm Approach by Nur Hafiza Binti Zakaria, Ramlan Mahmod, Nur Izura Udzir, Zuriati Ahmad Zukarnain, Suriyani Ariffin

    Published 2024
    “…The development of block cipher have resulted in a number of cryptographic algorithms such as FOX, BC2, HIGHT, KLEIN, KAMFEE, KAMKAR, ARIA, BLOWFISH256, DESL, REBC2, DSDP, 3D-AES and many more. …”
    Article
  9. 9

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…CPU implementations are becoming less efficient in handling the computation of crypto algorithms. Hence, other contemporary processor architectures such as GPU and FPGA have become popular alternative to speed up the computation in recent years.This dissertation first discusses several existing large integer multiplication algorithms and reviews different methods used to implement thediscussed algorithms done by other researchers in both Graphic Processing Unit (GPU) and Field Programmable Gate Array (FPGA).Compared to GPU, FPGA offered more low level design and development to the implementation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article