Search Results - (( development data virtualization algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- virtualization algorithm »
- data virtualization »
- development data »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…In this paper, several novel algorithms are proposed for the dynamic consolidation of VMs in cloud data centers. …”
Get full text
Get full text
Get full text
Article -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
11
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
Get full text
Get full text
Thesis -
12
Finger triggered virtual musical instruments
Published 2013“…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, rugosity is been developed by using QPS Fledermaus software. In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
Get full text
Get full text
Thesis -
14
Finger triggered virtual musical instruments
Published 2012“…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
17
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…In this study, a prototype of Augmented Reality system that implements gesture motion is developed. The use of the gesture motion algorithm enables an interactive environment in medical imaging.…”
Get full text
Get full text
Academic Exercise -
18
Real time power quality event detection using continuous wavelet transform
Published 2023“…The measurement hardware consists of data acquisition module with USB interface and the wavelet event detection algorithm was developed using MATLAB with graphical user interface to display the wavelet coefficients in real time and the recorded waveform. …”
Conference paper -
19
-
20
The development of spatio-temporal data model for dynamic visualization of virtual geographical information system
Published 2006“…Thus in this research, we focused on the data management aspect and has developed a suitable spatiotemporal data model for storing and retrieving volumetric geographic movement information. …”
Get full text
Get full text
Monograph
