Search Results - (( development under visualization algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- under visualization »
- development under »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
Visualization Tool for Pathfinding Algorithms
Published 2023“…This final year project aims to address the challenges faced by students in comprehending pathfinding algorithms by developing a web-based visualization tool. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Method of Event Reconstruction in Digital Investigation and its Visualization
Published 2011“…An algorithm is developed to derive a Deterministic Finite Automaton (DFA) that accepts computations of FSM that represent the functionality of system under investigation. …”
Get full text
Get full text
Thesis -
11
Machine learning approach for automated optical inspection of electronic components
Published 2019“…(Smith and Adendorff, 1991). Human visual inspection system is insufficient for conducting quality control under such increased capacity. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…For the benchmarking datasets, the AUC (Area under Curve) score of the proposed algorithm is quite comparable with previous works with the score of 0.9916. …”
Get full text
Get full text
Thesis -
13
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
14
A review on monocular tracking and mapping: from model-based to data-driven methods
Published 2022“…Finally, the popular benchmarks available for developing and evaluating these algorithms are presented along with a comparative study on a different class of algorithms. …”
Get full text
Get full text
Article -
15
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
Get full text
Get full text
Thesis -
16
VMware as an Intermediate Platform between Windows 7 and Linux Fedora 15 for Real-Time Malaysian Sign Language Translator
Published 2014“…Meanwhile, the Gt2k for gesture recognition is fully supported under LINUX. Therefore, a client/server technology has secured much time during the MSL recognition system development and helped in terms of algorithms enhancement…”
Get full text
Get full text
Proceeding Paper -
17
Design of artificial intelligence-based electronic Malay language learning tool for visually impaired children
Published 2011“…There are more than 20,000 people who are categorized under vision disability in Malaysia. The percentage of visually impaired people who master Malay language, as the national language in Malaysia, is low. …”
Get full text
Get full text
Thesis -
18
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Therefore, a new technique and algorithm were developed to resolve the image scale uncertainty. …”
Get full text
Get full text
Thesis -
19
VMware as an intermediate platform between Windows 7 and Linux Fedora 15 for real-time Malaysian sign language translator
Published 2014“…Meanwhile, the Gt2k for gesture recognition is fully supported under LINUX. Therefore, a client/server technology has secured much time during the MSL recognition system development and helped in terms of algorithms enhancement.…”
Get full text
Get full text
Get full text
Article -
20
