Search Results - (( development program function algorithm ) OR ( java communication encryption algorithm ))
Search alternatives:
- communication encryption »
- development program »
- function algorithm »
- java communication »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
3
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
4
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…ECC encrypts and transfers the private keys as AES private keys in the proposed scheme, while AES encrypts the plain text (communication data). …”
Get full text
Get full text
Thesis -
9
Secure E-Voting With Blind Signature
Published 2003“…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
11
A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch
Published 2016“…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
Get full text
Get full text
Get full text
Article -
12
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
Get full text
Get full text
Article -
13
Online Programming Judge System (UOJ)
Published 2013“…The system has the function to judge programming code by evaluating the output that the program produced. …”
Get full text
Get full text
Final Year Project -
14
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
Get full text
Get full text
Thesis -
15
-
16
Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai
Published 2021Get full text
Get full text
Thesis -
17
Comparative study of optimal power flow using evolutionary programming and immune evolutionary programming technique in power system / Mohd Khairil Izwan Md Daim
Published 2006“…The developed algorithm was tested against on IEEE 26 bus test system.…”
Get full text
Get full text
Thesis -
18
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…Movie Recommendation System is essentially developed for the purpose of producing a movie recommendation list therefore, it is paired with algorithm to provide the desired functionalities and features in the system. …”
Get full text
Get full text
Thesis -
19
Implementation of Color Filtering on FPGA
Published 2007“…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
Get full text
Get full text
Conference or Workshop Item -
20
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article
