Search Results - (( programming does encryption algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- programming does »
- java application »
- does encryption »
-
1
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…Hence, the fragmented CMS encryption algorithm will solve this problem and the errors in the message will be removed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Analysis of image steganography using AES / Nur Amira Muhamad Ghazali
Published 2020“…In this project, we combine the method of cryptography and steganography using Advanced Encryption Standard (AES) and Least Significant Bits (LSB) algorithms. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
4
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
Get full text
Get full text
Final Year Project -
5
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
Get full text
Conference or Workshop Item -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
7
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article
