Search Results - (( java implementation level algorithm ) OR ( using 3d process algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- process algorithm »
- level algorithm »
- 3d process »
- using 3d »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing
Published 2022“…Therefore, an integrated CAD/CAM system are used to automated the printing process by creating an algorithm that able to decide the type of printing process (3D, 4D or 5D printing) suitable with the model and convert it to STL file automatically. …”
Get full text
Get full text
Monograph -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
10
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
11
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
Get full text
Get full text
Research Report -
12
Contour generation algorithm for Projection Mask Stereolithography 3D printing process
Published 2018Get full text
Get full text
Conference or Workshop Item -
13
Expression invariant face recognition using multi-stage 3D face fitting with 3D morphable face model
Published 2010“…This 3D morphable model algorithm can be widely used for 3D face analysis and 3D face recognition in real time scenarios.…”
Get full text
Get full text
Conference or Workshop Item -
14
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Whether the key is not so strong or the time needed for processing is slow. In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
15
Contour generation for mask projection stereolithography 3D printing
Published 2019“…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
Get full text
Get full text
Thesis -
16
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Dijkstra's algorithm is one of the algorithms that could be used in network analysis process especially for 2D shortest route data. …”
Get full text
Get full text
Get full text
Thesis -
17
3D character reconstruction from 2D orthogonal images
Published 2025“…Instead of fully automating the modelling process, this project aims to introduce an algorithm that reconstruct primitive cubes of stylized 3D character from front, left, back and right orthogonal views images by integrating interactive image segmentation and blender scripting method. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Treemap algorithm for dynamic stormwater infiltration movement into soil surface
Published 2015“…Required information concerning rainfall and soil types were translated into a model based on the infiltration process occurred at the study area. Although most of the previous studies use Tree algorithm for 2D analysis, this study highlights the capability of the algorithm in 3D analysis by producing hierarchy for soil depth.…”
Get full text
Get full text
Get full text
Proceeding -
19
Treemap algorithm for dynamic stormwater infiltration movement into soil surface
Published 2015“…Required information concerning rainfall and soil types were translated into a model based on the infiltration process occurred at the study area. Although most of the previous studies use Tree algorithm for 2D analysis, this study highlights the capability of the algorithm in 3D analysis by producing hierarchy for soil depth.…”
Get full text
Get full text
Conference or Workshop Item -
20
Enhanced 3D terrain visualization process using game engine
Published 2018“…Furthermore, operating system resource needs to be used before it goes online. The main finding of this study is the new algorithm of enhancing 3D terrain visualization process using Unity3D game engine. …”
Get full text
Get full text
Get full text
Thesis
