Search Results - (( java applications security algorithm ) OR ( parameter navigation using algorithm ))

Refine Results
  1. 1
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Development Of Motion Planer And Navigation System For An Office Assistant Robot by Looi, Chen Zheng

    Published 2021
    “…Besides, map was generated by using SLAM algorithm, the costmap was setup and the parameters such as inflation_dist and cost_scaling_factor was studied and tuned based on this application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Guidance, navigation and control for satellite proximity operations using Tschauner-Hempel equations by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2011
    “…These algorithms are used to approach, flyaround, and to depart form a target vehicle in elliptic orbits. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak by Abdul Razak, Noorfadzli

    Published 2018
    “…Hence, fewer distances and time are consumed by the quadrotor navigation with the algorithm to return to the route after a deviation happened as compared to it navigation without it. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Guidance, navigation and control for satellite proximity operations using Tschauner-Hempel equations by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2014
    “…These algorithms are used to approach, flyaround, and to depart form a target vehicle in elliptic orbits. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Controller And Circuitry Design And Implementation For Fire Fighting Robot For MIROC 2014 Competition by Reyfill Konnik, Charlie Ivan

    Published 2014
    “…The motor control algorithm is developed by using DC motor control theory, which involves determining the motor's mechanical and electrical parameters.Upon the completion of mechanical fabrication, circuit design and parameter extraction, the process of developing the navigation algorithm begins. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Relative motion guidance, navigation and control for autonomous spacecraft rendezvous by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2011
    “…These algorithms are used to approach, flyaround, and to depart form a target vehicle in elliptic orbits. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Stereo matching algorithm for autonomous vehicle navigation using integrated matching cost and non-local aggregation by Zahari, Madiha, Hamzah, Rostam Affendi, Abd Manap, Nurulfajar, Herman, Adi Irwan

    Published 2023
    “…The results show that the accuracy of the disparity map is improved using the proposed methods after some parameter adjustment. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion by Ali, Mohammed A. H., Musa, Mailah, Jabbar, Waheb A., Moiduddin, Khaja, Ameen, Wadea, Alkhalefah, Hisham

    Published 2020
    “…A real-time roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion in a road environment is presented in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    Mobile robot safe navigation in unknown environment by Shayestegan, Mohsen, Marhaban, Mohammad Hamiruce

    Published 2012
    “…This paper provides a mobile robot navigation strategy using fuzzy logic is developed for a two wheeled mobile robot in a static environment. …”
    Get full text
    Conference or Workshop Item
  16. 16

    Numerical simulations of agent navigation via half-sweep modified two-parameter over-relaxation (HSMTOR) by F A Musli, Jumat Sulaiman, Azali Saudi

    Published 2021
    “…A new method called Half-Sweep Modified Two-Parameter Over-Relaxation (HSMTOR) is used to solve the navigational problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  17. 17
  18. 18

    A Navigation Strategy for Swarm Robotics Based on Bat Algorithm Optimization Technique by Nur Aisyah Syafinaz, Suarin, Pebrianti, Dwi, Bayuaji, Luhur, Muhammad, Syafrullah, Zulkifli, Musa

    Published 2018
    “…The analysis of the performance of proposed algorithm is conducted by considering two different parameters. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item