Search Results - (( development data virtualization algorithm ) OR ( java features encryption algorithm ))
Search alternatives:
- virtualization algorithm »
- data virtualization »
- features encryption »
- development data »
- java features »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
3
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
4
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…In this paper, several novel algorithms are proposed for the dynamic consolidation of VMs in cloud data centers. …”
Get full text
Get full text
Get full text
Article -
5
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
6
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
Get full text
Get full text
Thesis -
7
Finger triggered virtual musical instruments
Published 2013“…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, rugosity is been developed by using QPS Fledermaus software. In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
Get full text
Get full text
Thesis -
9
Finger triggered virtual musical instruments
Published 2012“…The musical notes recognition system matches the received triggering signal data with the predefined musical notes data using matching algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
12
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
13
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…In this study, a prototype of Augmented Reality system that implements gesture motion is developed. The use of the gesture motion algorithm enables an interactive environment in medical imaging.…”
Get full text
Get full text
Academic Exercise -
14
Real time power quality event detection using continuous wavelet transform
Published 2023“…The measurement hardware consists of data acquisition module with USB interface and the wavelet event detection algorithm was developed using MATLAB with graphical user interface to display the wavelet coefficients in real time and the recorded waveform. …”
Conference paper -
15
-
16
The development of spatio-temporal data model for dynamic visualization of virtual geographical information system
Published 2006“…Thus in this research, we focused on the data management aspect and has developed a suitable spatiotemporal data model for storing and retrieving volumetric geographic movement information. …”
Get full text
Get full text
Monograph -
17
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Thus, to develop an efficient scheme to generate non fixed iteration in the image scrambling algorithm in order to eliminate the problem of visual leakage. …”
Get full text
Get full text
Get full text
Article -
20
"Application of Neural Network in developing Virtual Analyzer of Reformate Research Octane Number"
Published 2005“…The interest of this Final Year Research Project covers the topic of Application of Artificial Neural Networks for developing virtual analyzer for petroleum quality, Research Octane Number. …”
Get full text
Get full text
Final Year Project
