Search Results - (( developing data protection algorithm ) OR ( java implementation path algorithm ))
Search alternatives:
- protection algorithm »
- java implementation »
- implementation path »
- developing data »
- path algorithm »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
State-of-the-art in techniques of text digital watermarking: challenges and limitations
Published 2016“…Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Development of Lightning Protection System (LPS) Designing Tool
Published 2015“…The tool would be developed and conducted by using Microsoft Excel 2010 since the algorithm was fit to be formulated in this software. …”
Get full text
Get full text
Final Year Project -
8
Novel rule base development from IED-resident big data for protective relay analysis expert system
Published 2016“…The developed PRAY runs its relay analysis by, first, validating whether a protective relay undertest operates correctly as expected by way of comparison between hypothesized and actual relay behavior. …”
Get full text
Get full text
Book Section -
9
A parallel XTS encryption mode of operation
Published 2009“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
10
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
12
Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan
Published 2017“…The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
Get full text
Get full text
Thesis -
13
Implementation of a parallel XTS encryption mode of operation
Published 2014“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article -
14
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
15
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
16
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…Role-based access control model in materialized view has been proposed to protect customer's data. However, relying on role only is insufficient and inefficient to protect data especially sensitive attributes. …”
Get full text
Get full text
Thesis -
17
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…An intrusion detection system (IDS) is required to protect data from security threats that infiltrate unwanted information via a regular channel, both during storage and transmission. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
19
Secure mobile AES encryptor (SMAE)
Published 2016“…When a user wants to send a file which contains confidential and important information, the user can protect the data inside the file by encrypting the data using the application developed using their mobile phones and send it to the person they intended to send the data. …”
Get full text
Get full text
Undergraduates Project Papers -
20
