Search Results - (( development process conversion algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- conversion algorithm »
- process conversion »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…This study also aims to develop an algorithm that uses conversion of greyscale image into RGB as an approach to image processing for greyscale image. …”
Get full text
Get full text
Monograph -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
11
An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application
Published 2020“…Therefore, this work presents an email to readable Vietnamese text conversion algorithm for use in TTS application. The average processing time tested on 60 emails is 1.7 milliseconds (ms). …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Optimization of emulsion polymerization of styrene and methyl methacrylate (MMA)
Published 2013“…Using gPROMS, the system analyzed the data, created models, developed algorithms, manipulated and plotted based on the functions and data. …”
Get full text
Get full text
Undergraduates Project Papers -
16
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…The paper describes the network algorithms developed and used in the design process of the AGR including simulations and circuit designs done for the prototype. …”
Get full text
Get full text
Final Year Project -
17
Multivariate Optimization of Biosynthesis of Triethanolamine-Based Esterquat Cationic Surfactant Using Statistical Algorithms
Published 2011“…All process parameters are selected to conduct the optimization by using some statistical algorithms such as Artificial Neural networks (ANNs), Response Surface Methodology (RSM), Wavelet Neural Network (WNN) and Partial Least Squares (PLS). …”
Get full text
Get full text
Thesis -
18
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…Chatbot is a computer program that simulates human conversation through voice commands or text chats or both. …”
Get full text
Get full text
Conference or Workshop Item -
19
The comparisons of OCR tools: a conversion case in the Malaysian Hansard Corpus development / Anis Nadiah Che Abdul Rahman ...[et al.]
Published 2019“…An OCR tool is able to enhance the accuracy of the results which as well relies on pre-processing and subdivision of algorithms. This study intends to investigate the performances of OCR tools in converting the Parliamentary Reports of Hansard Malaysia for developing the Malaysian Hansard Corpus (MHC). …”
Get full text
Get full text
Get full text
Article -
20
Video image processing for traffic analysis
Published 1992“…This paper will focus on the development of the system for vehicle detection and measurement. …”
Get full text
Get full text
Get full text
Article
