Search Results - (( java application optimisation algorithm ) OR ( using case encryption algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- case encryption »
- using case »
-
1
-
2
-
3
-
4
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006Get full text
Get full text
Thesis -
7
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…For data security, block ciphers like advanced encryption standard are needed. Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
Get full text
Get full text
Get full text
Article -
9
Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system
Published 2024“…Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. …”
Get full text
Get full text
Get full text
Article -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
11
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
Published 2021“…To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CPABE used logical connective operations to hide the attribute value of data in the access policy. …”
Get full text
Get full text
Article -
12
-
13
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algorithms. …”
Article -
14
Improved scalar multiplication algorithm in affine coordinate system using elliptic net
Published 2022“…In a similar comparison for the 512-bits case, the proposed algorithm attained are 67.23 %, 44.65 %, 30.37 %, and 22.64 % faster, respectively.…”
Get full text
Get full text
Get full text
Article -
15
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…In this paper, we are presenting a new and efficient computations algorithm for LUC Cryptosystems. We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
18
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. …”
Get full text
Get full text
Thesis -
19
Driving school student management system
Published 2005“…The ways the company manage their business are too complicated.Worst case comes when there are like a hundred of student to be managed in an hour, while the company Is currently short of workers to find each customer document to be updated.As a result,a system needs to be developed to replace the current system and enhance the company's performance of management.Driving School Student Management System is proposed to handle this job.The system is developed to handle the process of secured login using Rijndael symmetric encryption algorithm,registering new student,searching a student profile and also searching for student progress to be updated using simple linear sequential search algorithm.The expected result from this system is to get the correct output for each function and system is robust and free of error.…”
Get full text
Get full text
Undergraduates Project Papers -
20
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article
