Search Results - (( development practices visualization algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- practices visualization »
- development practices »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Visualization Tool for Pathfinding Algorithms
Published 2023“…This final year project aims to address the challenges faced by students in comprehending pathfinding algorithms by developing a web-based visualization tool. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…Overall, the VR products developed have proven to be practical and effective in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Buildthermo: an algorithm for visualizing building heat dynamics / Amira Shazlin Adnan ... [et al.]
Published 2024“…Our innovative algorithm is rigorously developed and validated, delivering precise assessments and facilitating informed decision-making in urban development. …”
Get full text
Get full text
Conference or Workshop Item -
12
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The massive volume of data involved in the development of a real-time terrain visualization and navigation system is inevitable. …”
Get full text
Get full text
Thesis -
13
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…In summary, the study develops algorithms for accurate image quality prediction, refining images, and enhancing visual quality. …”
Get full text
Thesis -
14
A Proposed Biologically Inspired Model for Object Recognition
Published 2009Get full text
Get full text
Book Section -
15
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
Get full text
Get full text
Thesis -
16
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
Get full text
Get full text
Thesis -
17
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…That is, the enhanced efficiency of coverage is obtained by developing a prior grid assessment practice to stress on the security sensitive zones. …”
Get full text
Get full text
Article -
18
Visdom: Smart guide robot for visually impaired people
Published 2025“…This report details the development of an autonomous guide robot system for visually impaired individuals using the ROS 2 framework and the Wheeltec R550 Robot platform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Segmentation of Sinus Images for Grading of Severity of Sinusitis
Published 2009Get full text
Get full text
Book Section -
20
