Search Results - (( java application customization algorithm ) OR ( things application force algorithm ))
Search alternatives:
- customization algorithm »
- things application »
- application force »
- java application »
- force algorithm »
-
1
Smart verification algorithm for IoT applications using QR tag
Published 2023“…Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things…”
Conference Paper -
2
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
3
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
SENSORY EXPERT: DEVICE FOR SENSORY TEST
Published 2018“…In developing the algorithm for heat sensing, humidity and temperature sensor DHT 11 is used and the data of temperature is displayed in Blynk applications. …”
Get full text
Get full text
Final Year Project -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
-
7
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
