Search Results - (( development evaluation security algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- development evaluation »
- application sensor »
- java application »
- sensor algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…A Database System Engine has been developed to measure the performance of the algorithm. …”
Get full text
Get full text
Thesis -
4
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…That is why a complementary security measure, trust evaluation system, is adopted here. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Article -
6
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
Get full text
Get full text
Thesis -
8
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
9
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
11
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
12
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…This paper presents the design and implementation of a symmetrical hybrid based 128 bit key AES-DES algorithm as a security enhancement for live motion image transmission. …”
Conference paper -
13
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
Article -
14
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…Drawing attention to this issue, the need to prioritise security should be considered during the development of the system, rather than treating it as an afterthought. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A security payment model for financial payment using mykad
Published 2011“…Moreover, the development of ARSA makes this model more secure and safer for the customers.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
18
A new 128-bit block cipher
Published 2009“…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
Get full text
Get full text
Thesis -
19
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…In recent years, with the rapid development of social economy and the continuous improvement of people’s living standard, the awareness of security precaution is becoming increasingly important. …”
Get full text
Get full text
Get full text
Thesis -
20
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project
