Search Results - (( developing does encryption algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- validation using »
- developing does »
- does encryption »
- java validation »
- using algorithm »
-
1
Secret channel using video steganography
Published 2017“…Most of the steganography software such as DeEgger Embedder and OurSecret does not have encryption algorithm to preserve the confidentiality for the secret message. …”
Get full text
Get full text
Get full text
Article -
2
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
Get full text
Get full text
Get full text
Thesis -
3
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This paper implements improved entrance security with the Advanced Encryption Standard (AES) algorithm. In addition, this solution also ensures the confidentiality of the visitors’ data. …”
Get full text
Get full text
Get full text
Proceeding -
4
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). …”
Get full text
Get full text
Get full text
Article -
5
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This paper implements improved entrance security with the Advanced Encryption Standard (AES) algorithm. In addition, this solution also ensures the confidentiality of the visitors’ data. …”
Get full text
Get full text
Get full text
Article -
6
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). …”
Get full text
Get full text
Get full text
Article -
7
Analysis of image steganography using AES / Nur Amira Muhamad Ghazali
Published 2020“…In this project, we combine the method of cryptography and steganography using Advanced Encryption Standard (AES) and Least Significant Bits (LSB) algorithms. …”
Get full text
Get full text
Thesis -
8
Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns
Published 2025“…This work will be exploited in our upcoming research to enhance AES performance by developing new encryption algorithm. ? 2024 The authors.…”
Article -
9
Driving school student management system
Published 2005“…The ways the company manage their business are too complicated.Worst case comes when there are like a hundred of student to be managed in an hour, while the company Is currently short of workers to find each customer document to be updated.As a result,a system needs to be developed to replace the current system and enhance the company's performance of management.Driving School Student Management System is proposed to handle this job.The system is developed to handle the process of secured login using Rijndael symmetric encryption algorithm,registering new student,searching a student profile and also searching for student progress to be updated using simple linear sequential search algorithm.The expected result from this system is to get the correct output for each function and system is robust and free of error.…”
Get full text
Get full text
Undergraduates Project Papers -
10
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
11
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
12
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…This system is suitable for the people at remote areas and sea where the communication infrastructure does not exist. In order to keep information secured while transmission, the system was incorporated with cipher algorithms. …”
Get full text
Get full text
Get full text
Thesis -
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
14
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The error between the calculated NSSP values and the measured NSSA values does not exceed 5%. The results of this study will remarkably facilitate the development of a practical secure cloud-based eHealth system.…”
Get full text
Get full text
Get full text
Thesis -
16
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
17
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
18
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
19
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis
