Search Results - (( developing secure data algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- developing secure »
- java application »
- data algorithm »
-
1
-
2
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
3
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
-
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Today security is the important thing that we need to transfer data from location to another safely. …”
Get full text
Get full text
Thesis -
7
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…As a result, information technology has advanced more, particularly in the areas of security and data secrecy. An essential component of data exchange is security and confidentiality. …”
Get full text
Get full text
Get full text
Article -
9
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
11
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Securing m-government transmission based on symmetric and asymmetric algorithms: A review
Published 2023“…Thus, the need for data security is inevitable. This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses. � 2013 Asian Network for Scientific Information.…”
Article -
14
Doctor-patient remote consultation system with secure medical images
Published 2022“…Hence, this kind of data had ‘rarer’ security compared to words. The most often security used recently in today’s industry is watermarking those multimedia data. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare safe communication between MN and CN. …”
Get full text
Get full text
Conference or Workshop Item -
16
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…The IEEE P1619 Security in Storage working Group (SISWG) is a prominent group in developing standards related to secure storage encryption. …”
Get full text
Get full text
Thesis -
18
A parallel XTS encryption mode of operation
Published 2009“…Securing data stored inside the storage devices is becoming an important concern in computer security now. …”
Get full text
Get full text
Conference or Workshop Item -
19
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
Get full text
Get full text
Monograph -
20
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
Article
