Search Results - (( development programme specialization algorithm ) OR ( java objective encryption algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…By adding new instruction extensions to the RISC-V cores, they could be specialized to run certain types of tasks. This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Design and development of a programmable painting robot for houses and buildings by Aris, I., Parvez Iqbal, A. K. M., Ramli, A. R., Shamsuddin, S.

    “…To Overcome This Difficulty, A Programmable Painter Robotic System Is Proposed, Designed And Developed. …”
    Get full text
    Get full text
    Article
  9. 9

    Design and development of a programmable painting robot for houses and buildings by Aris, A. K. M., Iqbal, Parvez, Ramli, A. R., Shamsuddin, S

    Published 2005
    “…To overcome this difficulty, a programmable painter robotic system is proposed, designed and developed. …”
    Get full text
    Get full text
    Article
  10. 10

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…To facilitate the complete pullback process of this group, a point locater algorithm is developed. In this work, we present three different pullback algorithms for the surfaces we considered and carefully integrate them into our Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing by Ch'ng, Heng Sun

    Published 2007
    “…The routing problems in VLSI physical design are, in essence, shortest path problems in special graphs. It has been shown that the performance of a graph-based shortest path algorithm can severely be affected by the performance of its priority queue. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Framework of Designing Multiple Microcontroller Based Applications by Selvakumar, Raja Saravana Kumar, Kamarul Hawari, Ghazali, Nik Mohd Kamil, Nik Yusof

    Published 2011
    “…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. The stress is given to the use of assembly code and high-level tools, where the algorithms are described in the form of different graphical notations, i.e. block diagrams. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Framework of Multi-Microcontroller Evaluation Tool for a use of Academic Environment by Selvakumar, Raja Saravana Kumar, Kamarul Hawari, Ghazali, Nik Mohd Kamil, Nik Yusof

    Published 2012
    “…These are presented in the second part of the paper describing the software part of the framework, which besides programming tools also discusses the code development tools. The stress is given to the use of assembly code and high-level tools, where the algorithms are described in the form of different graphical notations, i.e. block diagrams. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. This scalar multiplication algorithm is named Q-NAF scalar multiplication for binary curve over Lopez-Dahab coordinates. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient by Soleimani, Hojjatollah

    Published 2010
    “…So finally, their algorithms are easily programmable on computer. The computation of reflection coefficient of the corn was programmed using MATLAB software for the admittance approach and Method of Moment (MOM). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Efficient reconfigurable architectures for 3-D medical image compression by Ahmad, Afandi

    Published 2010
    “…These have provided an impetus to the development of other applications, in particular telemedicine and teleradiology. …”
    Get full text
    Get full text
    Thesis