Search Results - (( developing event encryption algorithm ) OR ( java visualisation using algorithm ))

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Genetic algorithm for event scheduling system by Hasan Basari, Abd Samad, Hussin, Burairah, Jalal, Siti Musliza, Mohd Isa, Nabihah

    Published 2010
    “…The system could be more efficient if password encryption is applied and the system is able to reply the message sent by UTeM’s staff asking for further events details.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Collision probability of one-to-many reversible mapping for IPV6 address generation by Nashrul Hakiem, Nashrul Hakiem, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito Wigati

    Published 2012
    “…This IPv6 address is generated dynamically using CFB (Cipher Feedback)mode of AES (Advanced Encryption Standard) algorithm based on user identity. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper