Search Results - (( developing formative function algorithm ) OR ( java information security algorithm ))

Refine Results
  1. 1

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…Therefore, SANAsms system ensures that information (SMS) interchange between sender and receiver is secured and protected because the messages containing delicate information are stored securely and remain undisclosed even when the device is accessed by an adversary. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8
  9. 9

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Improvement and application of particle swarm optimization algorithm by Deevi, Durga Praveen, Kodadi, Sharadha, Allur, Naga Sushma, Dondapati, Koteswararao, Chetlapalli, Himabindu, Perumal, Thinagaran

    Published 2025
    “…When severe actuator faults impede certain robots, functioning wheeled mobile robots (WMRs) adjust their formation to reduce the consequences of the malfunction. …”
    Get full text
    Get full text
    Article
  14. 14

    Development of a mathematical model for the prediction of chip formation instability and its verification by fuzzy logic with genetic algorithm by Ullah Patwari, Mohammed Anayet, Amin, A. K. M. Nurul, Istihyaq , M.H., Faris, Waleed Fekry

    Published 2010
    “…In this paper, a new analytical technique is proposed to predict the frequency of chip formation instability as a function of cutting parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
    Get full text
    Get full text
    Article
  18. 18

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modem Recognition Algorithm for Software Defined Radio Base Station by Rukumangatha Rajah, Sivaraman

    Published 2004
    “…Modem is the heart of a SDR system; it functions as an incoming modulation recogniser, multi-format demodulator, outgoing modulation recogniser, and multi-format modulator. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multi-Object Attitude and Rate Tracking for Spacecraft in Formation Flying by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2011
    “…Based on the same approach the relative dynamics and kinematics are augmented to the previous system to represent the overall system process model. The developed controller is applied to spacecraft in formation as a decentralized control algorithm which aims to track absolute and relative attitude and rates simultaneously.The developed controller is applied to a spacecraft formation in a remote sensing mission.The simulations results show the capabilities of the MSDRE to handle the multi-object tracking without any unnecessary control efforts that might lead to actuators saturations or additional control logic to switch between absolute and relative tracking. …”
    Get full text
    Get full text
    Proceeding Paper