Search Results - (( develop bring encryption algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Internet access using encrypted membercard / Muhammad Syafiq Sopian by Sopian, Muhammad Syafiq

    Published 2021
    “…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. User need to input the data using barcode scanner that contain ID and password of user. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…Fine-grained access control using Attribute-Based Encryption (ABE) mechanisms can be enforced as the first line of defense on the untrusted cloud to forbid unauthorized access to the stored data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Framework for location based attendance system by using fourth industrial revolution (4ir) technologies by Ali, Azhar, Koondhar, Muhammad, Depar, Mansoor Hyder, Maher, Zulfikar Ahmed, Rind, Muhammad Malook, Shah, Asadullah

    Published 2021
    “…The designed framework proved to be more secure, all the data in the framework was encrypted with a strong encryption algorithm, final attendance of successful students was stored in the blockchain structure to maintain the confidentiality and integrity in data. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
    Get full text
    Get full text
    Article