Search Results - (( java implementation path algorithm ) OR ( programming 1 encryption algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- programming 1 »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
-
5
-
6
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
7
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
8
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
12
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
13
A framework for GPU-accelerated AES-XTS encryption in mobile devices
Published 2011“…In this paper, we introduce a GPU-accelerated framework for storage encryption in mobile devices using the XTS-AES encryption algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
14
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
15
-
16
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…The sharing of confidential personal data such as medical data continues to take place regularly across the globe; it is therefore crucial to protect data from unauthorized access by adversaries. One of the algorithms that is commonly used due to its exemplary security and use in extensive applications is the advanced encryption standard (AES) algorithm. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
Published 2020“…The result shows Rabin-p encryption scheme runtime is faster at 50% and current withdraw less at 1.3% compared to HIME(R).…”
Get full text
Get full text
Get full text
Article -
19
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Get full text
Get full text
Student Project -
20
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). …”
Get full text
Get full text
Final Year Project
