Search Results - (( developing using 3d algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…In addition, a software package using Matlab for 2D and 3D path planning has also been developed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin by Saifuddin, Nur Fattin Nadhrah

    Published 2018
    “…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi by Ujang, Muhamad Uznir

    Published 2008
    “…Hereby, the Dijkstra’s algorithm is tested with the developed 3D navigation network inside the building model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…It may assist the developer on how to enhance the process of developing web-based 3D terrain visualization using Unity3D game engine.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Contour generation for mask projection stereolithography 3D printing by Faeiz Azizi, Adnan

    Published 2019
    “…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A novel hierarchical clustering algorithm for the analysis of 3D anthropometric data of the human head by Ellena, Thierry, Subic, Aleksandar, Mustafaa, Helmy, Yen, Pang Toh

    Published 2018
    “…The purpose of this study was to introduce a new method for the clustering of 3D head scans. A novel hierarchical algorithm was developed, in which a squared Euclidean metric was used to assess the head shape similarity of participants. …”
    Get full text
    Get full text
    Article
  17. 17

    Trajectory planning and simulation for 3d printing process by Ng, Chin Yong

    Published 2022
    “…The slicing method used is basic slicing. The slicing algorithm consists of two sections: intersection point tracking algorithm and contour creation algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    3D character reconstruction from 2D orthogonal images by Kok, Yung Thow

    Published 2025
    “…The proposed algorithm is organized into modular stages, allowing artists and developers to further improving the pipeline by integrating computer vision, AI models and 3D modelling and scripting techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments by AL-Obaidi, A.S., Jubair, M.A., Aziz, I.A., Ahmad, M.R., Mostafa, S.A., Mahdin, H., AL-Tickriti, A.T., Hassan, M.H.

    Published 2022
    “…This problem becomes more challenging due to the evolving nature of clusters in VANETs in general and in 3D VANETs in particular. This paper tackles the problem of 3D VANETs using a centralized clustering model based on the developed Cauchy density model. …”
    Get full text
    Get full text
    Article
  20. 20