Search Results - (( java information security algorithm ) OR ( program visualization using algorithm ))

Refine Results
  1. 1

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…Therefore, SANAsms system ensures that information (SMS) interchange between sender and receiver is secured and protected because the messages containing delicate information are stored securely and remain undisclosed even when the device is accessed by an adversary. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P., Saad, N.B., Ibrahim, R.B., Dass, S.C.

    Published 2017
    “…The main contribution of the paper is to introduce a dynamic programming algorithm, which defines an optimal policy for solving the visual sensor coverage problem. …”
    Get full text
    Get full text
    Article
  14. 14

    Simulation and Visualization of TSP Using Ant Colony Optimization by Tri Basuki, Kurniawan, Misinem, ., Astried, ., Joan Angelina, Widians

    Published 2023
    “…The study concludes that optimization can be applied using programming language to provide users with comfortable and intelligible simulations and visualizations.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming by Abdul Rahim, Ruzairi, Mohd. Nayan, Norkharziana, Fazalul Rahiman, Mohd. Hafiz

    Published 2006
    “…In order to process and simulate a tomography system, it has been found that Visual C++ programming has an advantage one step ahead compared to Visual Basic programming. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Budget visualizer using circle packing technique / Nursyahira Zulkeply by Zulkeply, Nursyahira

    Published 2019
    “…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Ray Casting for Iso-surface in Volumetric Data by Ngoc Anh, Do Hoang

    Published 2005
    “…The program will be able to render specific volume data using a single processor in a reasonable amount of time. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements by Ishak, Mohammad Hafifi Hafiz

    Published 2013
    “…By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Computer algorithm for playing checkers by Chua Shin Lee

    Published 2023
    “…The Checkers game is programmed using Visual C++. Two players can play the game or against the computer The Al algorithm will select the best path to win when playing against the human. …”
    text::Thesis