Search Results - (( java information security algorithm ) OR ( program implementation modified algorithm ))
Search alternatives:
- implementation modified »
- program implementation »
- java information »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Therefore, SANAsms system ensures that information (SMS) interchange between sender and receiver is secured and protected because the messages containing delicate information are stored securely and remain undisclosed even when the device is accessed by an adversary. …”
Get full text
Get full text
Conference or Workshop Item -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
6
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
Get full text
Get full text
Student Project -
7
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
9
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…In this research, a hand-written character recognition model are implemented in C++ programming with ability to classify digits 0, 1, 2, and 3. …”
Get full text
Get full text
Thesis -
14
Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems
Published 2012“…Single Program Multiple Data (SPMD) parallel paradigm will be used in the parallel implementation. …”
Get full text
Get full text
Proceeding Paper -
15
Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment
Published 2017“…For these proposed approaches, this study adopted a hybridization of a fuzzy programming, modify simulated annealing, and simplex downhill (SD) algorithm called Fuzzy-MSASD to resolve multiple objective linear programming APP problems in a fuzzy environment. …”
Get full text
Get full text
Thesis -
16
-
17
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…It has been found that by implementing the ACP algorithm, the solution predicted is approximately close or similar to the exact solution. …”
Get full text
Get full text
Thesis -
18
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…The Electric Transient and Analysis Program (ETAP) was used as the simulation tool, while Matrices Laboratory (MATLAB) was utilized to implement all the algorithms in this study. …”
Get full text
Get full text
Thesis -
19
1D Multigrid Solver For Finite Element Method
Published 2022“…A sample of such code written in MATLAB programming language was found in the GitHub repository, where the implemented algorithms are far from optimal. …”
Get full text
Get full text
Monograph -
20
VHDL implementation of a low frequency low pass IIR filter
Published 2009“…An IIR filter is designed using algorithms and is programmed using the VHDL language. …”
Get full text
Get full text
Student Project
