Search Results - (( java application force algorithm ) OR ( basic pattern encryption algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Extention and cryptanalysis of golden cryptography by Sharabyan, Mohammad Tahghighi

    Published 2015
    “…On the other hand, the encryption algorithm of GC is more suitable for textual data and cannot be directly applied to images. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  3. 3

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…Fractal objects have patterns, convergence, determinism, and reduction in dimensionality. …”
    Get full text
    Get full text
    Thesis