Search Results - (( development program specialization algorithm ) OR ( java objective encryption algorithm ))
Search alternatives:
- specialization algorithm »
- program specialization »
- development program »
- java objective »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
3
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
7
Heuristic approach to solution of unit commitment for electrical system / Azizan Harun
Published 1996“…The program is flexible and considers numerous special operating restrictions or constraints. …”
Get full text
Get full text
Student Project -
8
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. The latter is developed using an adapted algorithm of Hejhal and Then which is based on implicit automorphy and finite Fourier series. …”
Get full text
Get full text
Thesis -
9
Physical and computational modeling for finite element analysis
Published 1988“…In the past, the majority of papers relating to F.E analysis were related to the development of new special elements and the computational algorithms for equation or eigenvalue solutions. …”
Get full text
Get full text
Conference or Workshop Item -
10
The Development of Color Based Visual Search Utility
Published 2001“…Secondly, the color algorithm was developed to interpret natural expressions of content such as 10%, 20%, etc. …”
Get full text
Get full text
Thesis -
11
-
12
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…The application was programmed by JAVA FX. The system was developed stage by stage as it is consist of many small components to form a large system. …”
Get full text
Get full text
Thesis -
13
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The algorithm was developed in Visual Basic 6.0v programming language. …”
Get full text
Get full text
Thesis -
14
Speed control of separately excited dc motor using artificial intelligent approach
Published 2013“…The effectiveness of the proposed method is verified by develop simulation model in MATLAB-Simulink program. …”
Get full text
Get full text
Get full text
Thesis -
15
Effect of viscous dampers on yielding mechanisms of RC structures during earthquake
Published 2015“…A special finite element computer program was codified based on the developed algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Framework of Designing Multiple Microcontroller Based Applications
Published 2011“…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. …”
Get full text
Get full text
Conference or Workshop Item -
17
Framework of Multi-Microcontroller Evaluation Tool for a use of Academic Environment
Published 2012“…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. …”
Get full text
Get full text
Get full text
Article -
18
Development and implementation of a fuzzy logic controller for a high performance battery charging system using microcontroller
Published 2013Get full text
Get full text
Undergraduates Project Papers -
19
Graphical user interface for surface roughness prediction of CNC milling machine / Muhammad Qayyum Nor Asffan
Published 2020“…MATLAB is a programming platform specially designed for engineers. …”
Get full text
Get full text
Student Project -
20
