Search Results - (( development programme normalization algorithm ) OR ( java mean encryption algorithm ))
Search alternatives:
- normalization algorithm »
- programme »
- java »
-
1
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Biometrics electronic purse
Published 1999“…A simple PIN code verlfication is no longer suflcient and would require a more complex and fools proof authentication method. A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
Get full text
Get full text
Thesis -
5
Parallel computation of maass cusp forms using mathematica
Published 2013“…To facilitate the complete pullback process of this group, a point locater algorithm is developed. In this work, we present three different pullback algorithms for the surfaces we considered and carefully integrate them into our Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
6
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This paper proposes developed method to design a digital fuzzy logic controller with the aid of conventional Proportional – integral – derivative (PID) controller using field programmable gate array (FPGA). …”
Get full text
Get full text
Get full text
Article -
7
Agent-based extraction algorithm for computational problem solving
Published 2015“…Several statistical tests such as normality test and reliability analysis were conducted. …”
Get full text
Get full text
Thesis -
8
Automatic Classification of Cervix Type
Published 2019“…In a developed country like United States, cervical cancer rate has been improved by 70% in the last 40 years due to a good screening programmes implemented in their country. …”
Get full text
Get full text
Final Year Project -
9
A customized floating-point processor design for FPGA and ASIC based thermal compensation in high-precision sensing
Published 2021“…The signal processing techniques in the sensors are normally implemented using Field Programmable Gate Arrays (FPGAs) or Application-Specific Integrated Circuits (ASICs). …”
Get full text
Get full text
Article -
10
Nonlinear three-dimensional finite elements for composite concrete beams
Published 2012“…Therefore in this study, new interface elements have been developed,while modified constitutive law have been applied and new computational algorithm is utilised. …”
Get full text
Get full text
Thesis -
11
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…This thesis aimed to investigate and develop a novel parameterized architecture design for SENSE algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Preliminary study on fault detection using artificial neural network for water-cooled reactors
Published 2020“…This work was carried out to discover the use of an artificial neural network (ANN) to model and develop a fault detection programme in the RTP cooling system. …”
Get full text
Get full text
Get full text
Article -
13
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article
