Search Results - (( developing e encryption algorithm ) OR ( java location based algorithm ))
Search alternatives:
- developing e »
- e encryption »
- java »
-
1
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
An overview of video encryption techniques
Published 2010Get full text
Get full text
Get full text
Article -
3
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
4
Lightweight encryption technique to enhance medical image security on internet of medical things applications
Published 2021“…Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Encryption Technology on Windows Workstation
Published 2004“…The purpose of this study is to develop a new type of encryption methodbased on RSAtechnique. …”
Get full text
Get full text
Final Year Project -
7
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023Conference paper -
8
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The main for this techniques which was encryption and decryption were introduced and developed to provide security to these applications. …”
Get full text
Get full text
Student Project -
9
-
10
-
11
-
12
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
13
-
14
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
15
-
16
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
17
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
18
-
19
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…Therefore many are actually switching to e-commerce applications. Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
Get full text
Get full text
Undergraduates Project Papers -
20
