Search Results - (( adaptive a difference encryption algorithm ) OR ( adaptive web different extraction algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    The development and implementation of web content adaptation and negotiation based on user, device and network profiles / Harizah Sazali by Sazali, Harizah

    Published 2006
    “…In this project, we propose a page and video adaptation algorithms employing a mechanism to extract the semantic structure of an existing web page and a modular page splitting scheme to partition the web page into smaller and logically related content blocks or reduce the size of the distributed content. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification by Kamarudin, Noraziahtulhidayu, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Abushariah, Mohammad A. M., Hashim, Shaiful Jahari, Hassan Azhari, Abd Rauf

    Published 2015
    “…In order to conduct the AEC, three adaptive algorithms known as affine projection (AP), least mean square (LMS), and recursive least squares (RLS) are used during the preprocessing phase. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…With the expansion of the Internet (web 2.0) towards the Internet of Thing (IoT), where anything and everything can be connected to the internet, extracting useful information from a complex sensing environment at different spatial and temporal resolutions is challenging. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis