Search Results - (( development programme function algorithm ) OR ( java most encryption algorithm ))

Refine Results
  1. 1

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…This research hopes to give a clear idea to the readers about ABS algorithm. Further research about this topic is recommended to increase the efficiency of ABS algorithm implemented in communication field, so that more different types of field can be encrypted and decrypted instead of plaintext.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  10. 10

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    IMAGE PROCESSING ALGORITHMS ON FPGA by MOHAMED SHUKOR, MOHAMED NASIR

    Published 2007
    “…The objective of this project is to construct a real time hardware image processing system which based on Field Programmable Gate Array (FPGA). The chosen image processing algorithms are implemented on two systems which are Color Filtering System and Edge Detection System. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The objective of this paper is to construct a real time hardware image processing system on Field Programmable Gate Array (FPGA). The chosen image processing algorithm is a single Color Filtering algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm by Obaid, Zeyad Assi, Sulaiman, Nasri, Hamidon, Mohd Nizar

    Published 2009
    “…This paper proposes developed method to design a digital fuzzy logic controller with the aid of conventional Proportional – integral – derivative (PID) controller using field programmable gate array (FPGA). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Collaborative-based web recommender system for community-driven homestay programmes by Miraz, Mahadi Hasan

    Published 2017
    “…All these operations are carried out simultaneously to boost the functions of the CBWR system. Hence, this research contributes to the development of a specific unique web database and a CBWR system, which is adopted from collaborative algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Design of a floating point unit for 32-bit 5 stage pipeline processor by Low, Wai Hau

    Published 2020
    “…The development project will start by studying the algorithm of addition on floating point numbers. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of color filtering on FPGA by P., Sebastian, M.N.B.M., Shukor, H.H., Lo

    Published 2007
    “…The objective of this paper is to construct a real time hardware image processing system on Field Programmable Gate Array (FPGA). The chosen image processing algorithm is a single Color Filtering algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    MBIST implementation and evaluation in FPGA based on low-complexity March algorithms by Jidin, Aiman Zakwan, Mispan, Mohd Syafiq, Hussin, Razaidi, Weng, Fook Lee

    Published 2024
    “…This paper presents the implementation and validation of MBIST controllers that applied the March AZ1 and March AZ2 algorithms in a Field-Programmable Gate Array (FPGA) device. …”
    Get full text
    Get full text
    Get full text
    Article