Search Results - (( development index encryption algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- development index »
- index encryption »
- java application »
-
1
Implementation of a parallel XTS encryption mode of operation
Published 2014Get full text
Get full text
Get full text
Article -
2
Data hiding in medical images using encryption and steganography techniques
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
-
7
A study of watermarking methods in medical application
Published 2004“…The three methods of medical image watermarking that have been studied are Least Significant Bit (LSB), Rivest, Shamir and Adleman (RSA) encryption and decryption with LSB, RSA encryption and decryption with feature-based. …”
Get full text
Get full text
Thesis -
8
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
9
-
10
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
11
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…The proposed model is developed and simulated on Matlab based on an improved fuzzy vault scheme with a lightweight error correction algorithm to reduce the computational complexity when compared to previous work. …”
Get full text
Get full text
Get full text
Get full text
Thesis
