Search Results - (( java implementation level algorithm ) OR ( using 3d process algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  6. 6

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing by Ilias, Izzah Nadhilah

    Published 2022
    “…Therefore, an integrated CAD/CAM system are used to automated the printing process by creating an algorithm that able to decide the type of printing process (3D, 4D or 5D printing) suitable with the model and convert it to STL file automatically. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
    Get full text
    Get full text
    Research Report
  12. 12
  13. 13

    Expression invariant face recognition using multi-stage 3D face fitting with 3D morphable face model by Alomari, Abdallah A., Khalid, Fatimah, O. K. Rahmat, Rahmita Wirza, Abdullah, Muhamad Taufik

    Published 2010
    “…This 3D morphable model algorithm can be widely used for 3D face analysis and 3D face recognition in real time scenarios.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin by Engku Safruddin, Engku Maryam Syahdina

    Published 2018
    “…Whether the key is not so strong or the time needed for processing is slow. In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Contour generation for mask projection stereolithography 3D printing by Faeiz Azizi, Adnan

    Published 2019
    “…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi by Ujang, Muhamad Uznir

    Published 2008
    “…Dijkstra's algorithm is one of the algorithms that could be used in network analysis process especially for 2D shortest route data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    3D character reconstruction from 2D orthogonal images by Kok, Yung Thow

    Published 2025
    “…Instead of fully automating the modelling process, this project aims to introduce an algorithm that reconstruct primitive cubes of stylized 3D character from front, left, back and right orthogonal views images by integrating interactive image segmentation and blender scripting method. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Treemap algorithm for dynamic stormwater infiltration movement into soil surface by Siti Nurbaidzuri, Binti Reli @ Raily, Izham, Mohamad Yusoff, Habibah, Lateh, Muhamad Uznir, Ujang

    Published 2015
    “…Required information concerning rainfall and soil types were translated into a model based on the infiltration process occurred at the study area. Although most of the previous studies use Tree algorithm for 2D analysis, this study highlights the capability of the algorithm in 3D analysis by producing hierarchy for soil depth.…”
    Get full text
    Get full text
    Get full text
    Proceeding
  19. 19

    Treemap algorithm for dynamic stormwater infiltration movement into soil surface by Reli, Siti Nurbaidzuri, Yusoff, Izham Mohamad, Lateh, Habibah, Ujang, Uznir

    Published 2015
    “…Required information concerning rainfall and soil types were translated into a model based on the infiltration process occurred at the study area. Although most of the previous studies use Tree algorithm for 2D analysis, this study highlights the capability of the algorithm in 3D analysis by producing hierarchy for soil depth.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…Furthermore, operating system resource needs to be used before it goes online. The main finding of this study is the new algorithm of enhancing 3D terrain visualization process using Unity3D game engine. …”
    Get full text
    Get full text
    Get full text
    Thesis