Search Results - (( java application optimisation algorithm ) OR ( using com encryption algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- using com »
-
1
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
5
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
6
-
7
-
8
-
9
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
10
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
11
-
12
-
13
-
14
-
15
A performance improvement of Domosi’s cryptosystem
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
18
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
19
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017Get full text
Get full text
Article -
20
