Search Results - (( development evaluation security algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…A Database System Engine has been developed to measure the performance of the algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…That is why a complementary security measure, trust evaluation system, is adopted here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Designing New Block Cipher Based On Genetic Algorithm Approach by Nur Hafiza Binti Zakaria, Ramlan Mahmod, Nur Izura Udzir, Zuriati Ahmad Zukarnain, Suriyani Ariffin

    Published 2024
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Article
  6. 6

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  11. 11
  12. 12

    Security enhancement of digital motion image transmission using hybrid AES-DES algorithm by Vishnu M.B., Tiong S.K., Zaini M., Koh S.P.

    Published 2023
    “…This paper presents the design and implementation of a symmetrical hybrid based 128 bit key AES-DES algorithm as a security enhancement for live motion image transmission. …”
    Conference paper
  13. 13

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
    Article
  14. 14

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…Drawing attention to this issue, the need to prioritise security should be considered during the development of the system, rather than treating it as an afterthought. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…Moreover, the development of ARSA makes this model more secure and safer for the customers.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen by Dai , Zhen

    Published 2019
    “…In recent years, with the rapid development of social economy and the continuous improvement of people’s living standard, the awareness of security precaution is becoming increasingly important. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project