Search Results - (( development processes specification algorithm ) OR ( java objective encryption algorithm ))

Refine Results
  1. 1

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Overview of metaheuristic: classification of population and trajectory by Zainul Rashid, Zarina

    Published 2010
    “…Some algorithms can be defined if the developer of the system has problem specific knowledge to the solution. …”
    Get full text
    Get full text
    Monograph
  8. 8

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…The algorithm is developed by integrating the SURE model with the Autometrics search strategy; hence, it is named as SURE-Autometrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…In the field of bioinformatics, a pattern is also known as a motif. Numerous algorithms had been developed for MD, but most of these were not designed to discover species specific motifs used in identifying a specifically selected species where the exact location of these motifs also needs to be identified. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…A rule-based expert system has been developed in which the knowledge used to assist Hazard and Operability Study is divided into process-specific and process-general components. …”
    Get full text
    Get full text
    Article
  12. 12

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Software requirement specification (SRS) document is the most crucial document in software development process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Statistical Based Real-Time Selective Herbicide Weed Classifier by Ahmed, Irshad, Abdul Muhamin , Naeem, Muhammad, Islam, Azween, Abdullah

    Published 2007
    “…This algorithm is specifically developed to classify images into broad and narrow class for real-time selective herbicide application. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…In the field of bioinformatics, a pattern is also known as a motif. Numerous algorithms had been developed for MD, but most of these were not designed to discover species specific motifs used in identifying a specifically selected species where the exact location of these motifs also needs to be identified. …”
    Get full text
    Get full text
    Thesis
  16. 16

    On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B., Alsewari, Abdulrahman A.

    Published 2015
    “…Much useful progress has been achieved as plethora of t-way strategies have been developed in the literature in the last 30 years. Recently, in line with the upcoming field called Search based Software Engineering (SBSE), many newly strategies have been developed adopting specific optimization algorithm (e.g. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…The study’s second objective is to apply IQA practically in image processing applications/operations. It specifically tackles image reconstruction, a vital post-processing task in image systems. …”
    Get full text
    Thesis