Search Results - (( development using interception algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- interception algorithm »
- development using »
- java application »
-
1
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…They need to communicate in secure environment to avoid eavesdropping or interception. The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
Get full text
Get full text
Thesis -
2
Methods of aircraft trajectory optimisation in air combat
Published 2007“…An algorithm has been developed and implemented using Evolutionary Programming. …”
Get full text
Get full text
Article -
3
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…However, much of this sensor data is transmitted without encryption, exposing it to risks such as interception, tampering, and unauthorised access. This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Rekabentuk, Analisis Dan Perlaksanaan Sistem Ka Walan Meriam
Published 1999“…time taken by a shell and a target to arrive at the same position which is known as point of intercept. The prediction algorithm has been developed using numerical method which tunes the time of flight and gun aiming point to obtain the point of intercept error within an acceptable maximum value or predetermined tuning iteration. …”
Get full text
Get full text
Thesis -
5
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023Conference paper -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
Optimal Real Time Evasion against High Speed Pursuer Using Evolutionary Programming
Published 2006“…The pursuer simply home-in to the evader and the evader follows the trajectory suggested from the algorithm. In both scenarios, the evader is able to steer itself from interception.…”
Get full text
Get full text
Conference or Workshop Item -
8
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
10
Detection of butter adulteration with lard by employing 1H-NMR spectroscopy and multivariate data analysis
Published 2014“…Since the spectra obtained were too complex to be analyzed visually by the naked eyes, the classification of spectra was carried out using multivariate data analysis. The spectroscopic data of butter adulterated with lard samples were chemometrically evaluated and calibrated using the partial least square (PLS) algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
11
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
Get full text
Get full text
Get full text
Thesis -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. …”
Get full text
Get full text
Get full text
Article -
14
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. …”
Get full text
Get full text
Get full text
Article -
15
FT-IR- based metabolomics approach to characterize the α-glucosidase inhibitory activity of Salak fruit
Published 2017“…Multivariate analysis with combination of orthogonal partial least-squares (OPLS) algorithm was used to correlate the α-glucosidase inhibitory activity of the samples with the infrared spectral data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…To implement the proposed mechanism, we demonstrate the strength of the classifier using a dimensionally reduced dataset using NSL-KDD. …”
Get full text
Get full text
Thesis
