Search Results - (( developing state encryption algorithm ) OR ( java a function algorithm ))

Refine Results
  1. 1

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns by Hazzaa F., Qashou A., Al Barazanchi I.I., Sekhar R., Shah P., Bachute M., Abdulbaqi A.S.

    Published 2025
    “…This work will be exploited in our upcoming research to enhance AES performance by developing new encryption algorithm. ? 2024 The authors.…”
    Article
  4. 4

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Secure block cipher inspired by the human immune system by Ariffin, Suriyani

    Published 2012
    “…Symmetric encryption block cipher is an important cryptographic algorithm and the quest of enhancing data security is crucial due to the heavy usage of internet and mobile devices worldwide. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…As a result, the objectives for this project are to study the most suitable algorithms used for a movie recommender system, to implement Collaborative Filtering algorithm on a movie recommender system prototype and to test the functionality of the movie recommender system, hi this project, a movie recommendation system with the use of Collaborative Filtering is proposed to produce a set list of movies for the users. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  14. 14

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Key features include the SMAC Hybrid A* algorithm for global path planning, the Regulated Pure Pursuit Controller for local trajectory execution and dynamic obstacle avoidance, and gmapping for SLAM functionality. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Evolutionary Music; Composing Beats and Chords Progression by Ng, Hayden

    Published 2020
    “…This project focuses on delivering a JAVA application named “Evoluthm” with mainly the functions of generating chords progressions and beats. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…The results of this study will remarkably facilitate the development of a practical secure cloud-based eHealth system.…”
    Get full text
    Get full text
    Get full text
    Thesis