Search Results - (( source information security algorithm ) OR ( java application using algorithm ))
Search alternatives:
- source information »
- java application »
- using algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…In daily life, we use internet or accessing information from various sources. Some of the procedure requires us to sending our own information. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…In daily life,we use Internet or accessing information from various sources.Some of the procedure requires us to sending our own information.The objective of this project is to explore the way of doing encryption,improve certain aspect of the existing algorithm and to find out a way to create better security.In this project,encryption will be implemented in information on a web that makes it hard to be readable and secure.For that matter,encryption method known as Caesar cipher,one of the simplest and most widely used encryption techniques.In this encryption,it uses the substitution cipher in which each letter in the plaintext is replaced by some fixed number of position down the alphabet. …”
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
-
8
Lattice-based cryptography: the dots that provide information security
Published 2023Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…This research offers a user-friendly interface for securely embedding and extracting secret information within digital images. …”
Get full text
Get full text
Get full text
Article -
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Comparative analysis of firefly algorithm for solving optimization problems
Published 2017Get full text
Get full text
Book Section -
13
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…IPSEC protocol network setup encrypt the overall IP traffic packets before being transferred from source to destination in order to secure the tunnels. …”
Get full text
Get full text
Thesis -
14
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…IPSEC protocol network setup encrypt the overall IP traffic packets before being transferred from source to destination in order to secure the tunnels. …”
Get full text
Get full text
Article -
15
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
17
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
18
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
20
