Search Results - (( development database encryption algorithm ) OR ( java application optimized algorithm ))

Refine Results
  1. 1

    A hybrid database encryption algorithm based on reverse string and dynamic key by Abduljabbar, Waleed Khalid, Mohd Jamil, Jastini, Mohd Shaharanee, Izwan Nizal, Ahmed, Waleed K., Ali, Azhar Tareq

    Published 2016
    “…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…Android Studio software is used in developing the project. The data involved is stored in database by using Firebase database. …”
    Get full text
    Get full text
    Student Project
  4. 4

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  6. 6

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The main for this techniques which was encryption and decryption were introduced and developed to provide security to these applications. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…There are three types of measurement parameters that have been used for the testing. A Database System Engine has been developed to measure the performance of the algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Internet access using encrypted membercard / Muhammad Syafiq Sopian by Sopian, Muhammad Syafiq

    Published 2021
    “…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. User need to input the data using barcode scanner that contain ID and password of user. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
    Get full text
    Get full text
    Article
  10. 10

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11
  12. 12

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…Through analysing the functional requirements of the system in the project, using MySQL database and Enhancer platform, the intelligent fault diagnosis management system of cloud computing power plant is designed and developed, which realises the functions of system modules such as system authority management, electronic equipment account, technical supervision, expert database, data centre. …”
    Article
  17. 17
  18. 18
  19. 19

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…Then, cryptosystem algorithm based on Hill Cipher and random number is implemented as encryption and decryption techniques as protection for registered users as stored in the database. …”
    Get full text
    Get full text
    Thesis