Search Results - (( development program normalization algorithm ) OR ( java objective encryption algorithm ))
Search alternatives:
- normalization algorithm »
- program normalization »
- development program »
- java objective »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
3
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
7
Parallel computation of maass cusp forms using mathematica
Published 2013“…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
Get full text
Get full text
Thesis -
8
Solving non-convex economic dispatch problem using computational intelligence technique
Published 2023Conference Paper -
9
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
10
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010Get full text
Get full text
Thesis -
11
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
Data mining in network traffic using fuzzy clustering
Published 2003“…The network traffic model is very important to know whether that particular network traffic is normal or abnormal. In this project, I have developed a program to capture and filter the packets based on the application. …”
Get full text
Get full text
Thesis -
16
Data mining in network traffic using fuzzy clustering
Published 2003“…The network traffic model is very important to know whether that particular network traffic is normal or abnormal. In this project, I have developed a program to capture and filter the packets based on the application. …”
Get full text
Get full text
Thesis -
17
Multi -Objective Economic Dispatch Using Evolutionary Programming
Published 2023“…The designated algorithm of MOEP used MATLAB to run the simulations. …”
-
18
Agent-based extraction algorithm for computational problem solving
Published 2015“…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. …”
Get full text
Get full text
Thesis -
19
-
20
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper
