Search Results - (( knowledge generation encryption algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- generation encryption »
- knowledge generation »
- java application »
-
1
Second Level Password Generator
Published 2010Get full text
Get full text
Conference or Workshop Item -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
3
Effect Of The Number Of Tapping Bits Of The A5/1 Stream Cipher Towards Hardware Performance
Published 2024“…A5/1 stream cipher is a type of cryptographic algorithm which is widely used for encryption of the GSM communication. …”
Get full text
Article -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…The test findings prove that the decentralized authentication platform-based blockchain-based IoT (BIoT) device-to-device architecture has a significantly higher throughput than the gateway-based architecture. To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Improving GSM Security By Enhancing Randomness Property Of A5/1 Design
Published 2024Get full text
Get full text
Article
