Search Results - (( development programme detection algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- programme »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Real time motorcycle image detections on field programmable gate array
Published 2015“…Development of real time motorcycle image detections on field programmable architecture is presented in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Implementation of Real-time Simple Edge Detection on FPGA
Published 2005“…The chosen image processing algorithms implemented was edge detection. This work utilizes Altera DE2 development board powered by Cyclone II FGPA pair with 1.3 Mega pixel CMOS camera from Terasic Technologies. …”
Get full text
Get full text
Conference or Workshop Item -
11
Implementation of real-time simple edge detection on FPGA
Published 2007“…The chosen image processing algorithms implemented was edge detection. This work utilizes Altera DE2 development board powered by Cyclone II FGPA pair with 1.3 Mega pixel CMOS camera from Terasic Technologies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
IMAGE PROCESSING ALGORITHMS ON FPGA
Published 2007“…The objective of this project is to construct a real time hardware image processing system which based on Field Programmable Gate Array (FPGA). The chosen image processing algorithms are implemented on two systems which are Color Filtering System and Edge Detection System. …”
Get full text
Get full text
Final Year Project -
13
-
14
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item -
15
Development of shape pattern recognition for fpga-based embbeded object tracking system
Published 2010Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Low area Programmable Memory Built-In Self-Test (PMBIST) for small embedded ram cores / Nur Qamarina Mohd Noor
Published 2013“…The memory BIST applies various test algorithms such as MARCH tests to detect various RAM faults. …”
Get full text
Get full text
Thesis -
17
Development of a steady state visual evoked potential (SSVEP)-based brain computer interface (BCI) system
Published 2007“…This paper describes the development of a synchronous, online brain computer interface (BCI) system based on detecting the steady-state visual evoked potential (SSVEP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using asic design flow: article / Nurzaima Mahmod
“…To optimize the performance of the algorithm by exploiting parallelism in the design several techniques have been developed. …”
Get full text
Get full text
Article -
19
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019“…The main objective for this study is to analyse the harmonics components in AC power system using Fast Fourier Transforms (FFT) algorithm. Other than that, the objective is also to design and develop the harmonic detection system for power quality of AC power system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
MBIST implementation and evaluation in FPGA based on low-complexity March algorithms
Published 2024“…This paper presents the implementation and validation of MBIST controllers that applied the March AZ1 and March AZ2 algorithms in a Field-Programmable Gate Array (FPGA) device. …”
Get full text
Get full text
Get full text
Article
