Search Results - (( development process visualization algorithm ) OR ( java mean encryption algorithm ))
Search alternatives:
- process visualization »
- java »
-
1
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Biometrics electronic purse
Published 1999“…A simple PIN code verlfication is no longer suflcient and would require a more complex and fools proof authentication method. A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
5
Visualization Tool for Pathfinding Algorithms
Published 2023“…This final year project aims to address the challenges faced by students in comprehending pathfinding algorithms by developing a web-based visualization tool. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
6
-
7
Zest Based Visualization for Requirements Negotiation
Published 2011“…This research sought to use this algorithm in visualizing the RN process in groupware. …”
Get full text
Get full text
Article -
8
Enhanced 3D terrain visualization process using game engine
Published 2018“…It may assist the developer on how to enhance the process of developing web-based 3D terrain visualization using Unity3D game engine.…”
Get full text
Get full text
Get full text
Thesis -
9
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…This paper presents an automatic visual inspection of exterior surface defects of oil tanks using unmanned aerial vehicles (UAVs) and image processing with two cascading fuzzy logic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The massive volume of data involved in the development of a real-time terrain visualization and navigation system is inevitable. …”
Get full text
Get full text
Thesis -
11
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster labelling process, a cluster labelling algorithm based on calculation of minimum-distance (MD) between cluster mean and class mean was developed to label the clusters. …”
Get full text
Get full text
Thesis -
12
A cascading fuzzy logic with image processing algorithm-based defect detection for automatic visual inspection of industrial cylindrical object’s surface
Published 2018“…The image processing algorithm has been developed to extract the main features of the tested objects such as defects, borders, and noise. …”
Get full text
Get full text
Get full text
Article -
13
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…Visualization techniques help in understanding the searching behaviour of Genetic Algorithm. lt also makes possible the user interactions during the searching process. …”
Get full text
Get full text
Thesis -
14
Buildthermo: an algorithm for visualizing building heat dynamics / Amira Shazlin Adnan ... [et al.]
Published 2024“…Our innovative algorithm is rigorously developed and validated, delivering precise assessments and facilitating informed decision-making in urban development. …”
Get full text
Get full text
Conference or Workshop Item -
15
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…In three dimensional simulations, post-processing poses considerable challenge since available data visualization software programs do not accommodate such a high order visualization—common data visualizers can only visualize for up to ten-node tetrahedron elements. …”
Get full text
Get full text
Thesis -
17
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…First, the hadith data and the user query will go through the pre-processing method. Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
Get full text
Get full text
Thesis -
18
Visualization of dengue incidences using expectation maximization (EM) algorithm
Published 2017“…R-GIS(R software) and clustering algorithm were used for year 2014 with several weeks to develop the relation between the visualization and prediction of reported incidences. …”
Get full text
Get full text
Article -
19
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes
Published 2023Conference Paper
