Search Results - (( knowledge generation encryption algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2
  3. 3

    Effect Of The Number Of Tapping Bits Of The A5/1 Stream Cipher Towards Hardware Performance by S.Y.A.M. Fauzi, M. Othman, F.M.M. Shuib, K. Seman

    Published 2024
    “…A5/1 stream cipher is a type of cryptographic algorithm which is widely used for encryption of the GSM communication. …”
    Get full text
    Article
  4. 4

    The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios by Arun Rana, Sharad Sharma, Kashif Nisar, Ag. Asri Ag. Ibrahim, Sachin Dhawan, Bhawani Chowdhry, Samreen Hussain, Nitin Goyal

    Published 2022
    “…The test findings prove that the decentralized authentication platform-based blockchain-based IoT (BIoT) device-to-device architecture has a significantly higher throughput than the gateway-based architecture. To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6