Search Results - (( development control encryption algorithm ) OR ( java visualization using algorithm ))
Search alternatives:
-
1
-
2
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
3
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
4
-
5
-
6
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
7
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…For data security, block ciphers like advanced encryption standard are needed. Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
Get full text
Get full text
Get full text
Article -
9
Internet access using encrypted membercard / Muhammad Syafiq Sopian
Published 2021“…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. …”
Get full text
Get full text
Student Project -
10
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Encryption method for SCADA security enhancement
Published 2014Get full text
Get full text
Get full text
Article -
13
-
14
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
15
Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin
Published 2003“…A software programming based on LabVIEW was developed for data processing and presentation. The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
Get full text
Get full text
Thesis -
16
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
17
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For secure communication that is reliable, secure, and has good performance, the focus is on developing Double Encryption System (DES). The combination of synchronization of chaos and symmetric encryption is called DES. …”
Get full text
Get full text
Get full text
Thesis -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
Get full text
Get full text
Monograph -
19
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
20
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
