Search Results - (( development programme visualization algorithm ) OR ( java objective encryption algorithm ))
Search alternatives:
- programme visualization »
- java objective »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
3
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. Nowadays,most encryption and decryption processes are done by the computer.The main objective of this project is to build a text encryption and decryption system that will run on a Java enabled mobile phones.Then,the mobile phones will be used as an external means to encrypt text messages.As mentioned earlier,not only computers can encrypt and decrypt text but mobile phones also can encrypt and decrypt text messages.The purpose of this research is to provide security for confidential information to be sent over mobile phones.At the moment there is no security for messages transmitted over mobile phones.Confidential information or instructions can only be safely passed on to the required parties by email or verbally in person.This delays time and efficiency of crucial business operations. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
7
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
8
Development of a steady state visual evoked potential (SSVEP)-based brain computer interface (BCI) system
Published 2007“…The system includes a programmable visual stimulator, EEG amplifier with filter system, data acquisition card, and signal processing and classification algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item -
10
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…A simulation computer program was developed using Visual Basic Editor in Microsoft excel 2007. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An efficient low-cost real-time brain computer interface system based on SSVEP
Published 2010“…The system includes a frequency-programmable visual stimulator, EEG-band amplifier and filter, 16-bit data acquisition card, and signal processing and classification algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Scentopia: Navigating the World of Fragrance
Published 2024“…In order to solve the difficulties customers encounter while attempting to navigate the bewildering array of perfumes on the market, this study presents the creation of “Scentopia” as a Final Year Project. The programme streamlines the perfume picking process and directs users towards their ideal smell match by utilising cutting-edge algorithms, personalised scent profile, and user-friendly interfaces. …”
Get full text
Get full text
Final Year Project -
13
-
14
The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh
Published 2020“…In conclusion, more than a quarter of hypertensive male Malaysians had LVH and genetic factor (rare CNV) plays a contributing factor to the development of HT LVH+ through alteration of the functional regulation of foetal cardiac gene programme. …”
Get full text
Get full text
Thesis
