Search Results - (( development status visualization algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of task distribution algorithm for multi-robot coordination system by Sin, Han Bin

    Published 2022
    “…RMF Panel provides an online platform to perform task submission and enables real-time visualization of task distribution of robots as well as robots’ status. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Domestic garbage target detection based on improved YOLOv5 algorithm by Ma, Haohao, Wu, Xuping, As'arry, Azizan, Han, Weiliang, Mu, Tong, Feng, Yanwei

    Published 2023
    “…In order to reduce the intensity of manual garbage classification and improve the efficiency and accuracy of garbage classification, a new type of household garbage classification based on improved YOLOv5 algorithm visual recognition is designed. Make a data set for garbage detection, and after training on the improved YOLOv5 network framework, detect the status of garbage in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Human presence detection system by Tai, Xi Yang

    Published 2024
    “…Additionally, the development of an automated calculation algorithm streamlines the testing process and enhances data collection efficiency. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Pyroelectric infrared sensor for intruder detection by Moghavvemi, M., Seng, L.C.

    Published 2004
    “…A software package has been developed for visual display, control mechanism configuration, and embedded server-client application.…”
    Get full text
    Conference or Workshop Item
  14. 14

    Review and bibliometric analysis of AI-driven advancements in healthcare by Wang, Yi Jie, Choo, Wei Chong, Ng, Keng Yap

    Published 2024
    “…Purpose: This research intends to use literature review and bibliometric analysis methods to visually review the development status and important historical milestones of Artificial Intelligence, as well as the basic research, key topics, and future potential research hot spots of AI in the healthcare field. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Forecasting and tracking of project completion dateline using requirement traceability matrix in scrum by Tan, Eng Ian

    Published 2024
    “…A Requirements Traceability Matrix (RTM) will be provided, summarizing the status of all SCRUM projects in a single table. Lastly, the project will implement an estimation model, an algorithm designed to predict the final completion date of SCRUM projects.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    An image processing technique for mental health assessment from Electrophotonic by Janifal Alipal

    Published 2019
    “…In brief, through these digital parameters, the energy level of different mental health status in 160 images of healthy and mentally ill subjects is quantified. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An image processing technique for mental health assessment from electrophotonic images by Janifal Alipal

    Published 2019
    “…In brief, through these digital parameters, the energy level of different mental health status in 160 images of healthy and mentally ill subjects is quantified. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Traffic congestion detection for smart and control transportation management by Khalifa, Othman Omran, Marzuki, Azri A., Abdul Malik, Noreha, Hassan Gani, Mohammad H.

    Published 2020
    “…The modern terrain of asphalt and motorways have become a standard of everyday life in a developed and developing nation. The rise in usage of motor vehicles has lead to the need to better regulate their use. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Traffic congestion detection for smart and control transportation management by Khalifa, Othman Omran, Marzuki, Azri A., Abdul Malik, Noreha, Hassan Gani, Mohammad H.

    Published 2022
    “…The modern terrain of asphalt and motorways have become a standard of everyday life in a developed and developing nation. The rise in usage of motor vehicles has lead to the need to better regulate their use. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Design and development of iRemote Terminal Unit (iRTU) for undervoltage and overvoltage fault by Wan Nor Shela Ezwane, Wan Jusoh

    Published 2014
    “…The purpose of this research is to design an iRTU hardware circuit board, develop the iRTU using software algorithms, create the interfacing for monitoring process and integrate software and hardware together to make the iRTU as a complete system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis