Search Results - (( development programme visualization algorithm ) OR ( java features encryption algorithm ))

Search alternatives:

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a steady state visual evoked potential (SSVEP)-based brain computer interface (BCI) system by Leow, R.S., Ibrahim, F., Moghavvemi, M.

    Published 2007
    “…The system includes a programmable visual stimulator, EEG amplifier with filter system, data acquisition card, and signal processing and classification algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…A simulation computer program was developed using Visual Basic Editor in Microsoft excel 2007. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An efficient low-cost real-time brain computer interface system based on SSVEP by Leow, R.S., Moghavvemi, M., Ibrahim, F.

    Published 2010
    “…The system includes a frequency-programmable visual stimulator, EEG-band amplifier and filter, 16-bit data acquisition card, and signal processing and classification algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Scentopia: Navigating the World of Fragrance by Abd Mutalib, Nurrul Kamaliah

    Published 2024
    “…In order to solve the difficulties customers encounter while attempting to navigate the bewildering array of perfumes on the market, this study presents the creation of “Scentopia” as a Final Year Project. The programme streamlines the perfume picking process and directs users towards their ideal smell match by utilising cutting-edge algorithms, personalised scent profile, and user-friendly interfaces. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12

    The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh by Mat Jusoh, Julia Ashazila

    Published 2020
    “…In conclusion, more than a quarter of hypertensive male Malaysians had LVH and genetic factor (rare CNV) plays a contributing factor to the development of HT LVH+ through alteration of the functional regulation of foetal cardiac gene programme. …”
    Get full text
    Get full text
    Thesis