Search Results - (( java implementation _ algorithm ) OR ( using message ((data algorithm) OR (path algorithm)) ))
Search alternatives:
- java implementation »
- data algorithm »
- path algorithm »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
2
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
4
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
5
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
8
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
9
Network monopoly / Tan Kean Yeap
Published 2002“…The number of computers in use worldwide, according to the International Data Corporation, is in excss of 100 milion. …”
Get full text
Get full text
Thesis -
10
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…The CTMRP is designed for decision maker based on threshold value of average paths signal for efficient transmission of the Text, image, audio and video as well as sending the data via multiple paths, which mitigate the negatives effects causes from forcing the nodes to send the data via single. …”
Get full text
Get full text
Get full text
Article -
11
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…Each of these nodes is connected to each other through interconnection networks and passes message using a standard message passing mechanism. …”
Get full text
Get full text
Get full text
Article -
13
A collision resistant cryptographic hash function based on cellular automata rules
Published 2013“…Popular hash functions are Message Digest 4/5 (MD-4/5), Secure Hashing Algorithm (SHA-0/1) and RIPEMD, which are referred to as MDx-class hash functions due to some commonalities in their design with the MD-family. …”
Get full text
Get full text
Thesis -
14
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2016“…To overcome this problem, vehicles can be used as carriers to deliver messages using store-and-carry forwarding whenever forwarding option via wireless transmission is not available. …”
Get full text
Get full text
Get full text
Article -
15
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2015“…To overcome this problem, vehicles can be used as carriers to deliver messages using store-and-carry forwarding whenever forwarding option via wireless transmission is not available. …”
Get full text
Get full text
Get full text
Article -
16
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra's algorithm is used to establish the shortest connection for each net. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
STITCH-256: A dedicated cryptographic hash function
Published 2023“…Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. …”
Article -
18
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
19
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
Get full text
Get full text
Thesis -
20
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis
