Search Results - (( security application sensor algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1
  2. 2

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Vault’s floor security sensor with RFID access using microcontroller: article / Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…The system uses a microcontroller for the simple algorithm of the signal processing. The algorithm for the RFID access and the security sensor was commercial software to control the microcontroller and interfacing circuits.…”
    Get full text
    Get full text
    Article
  4. 4

    Vault's floor security sensor with RFID access using microcontroller/ Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…A solution to these problems is to design an embedded system that provides an application of RFID for access and a photo sensor for the guarding system that runs on low power and at a lower cost to compare to the commercialize security sensor. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so the implementation of security in such a restrictive environment is a challenging task. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Secure routing using frequency hopping in wireless sensor network by Raja Mohd. Radzi, Raja Zahilah

    Published 2007
    “…Hence, such networks enable a variety of consumer applications, such as emergency rescue, disaster relief, smart homes and patient monitoring, industrial applications, such as structural health monitoring and environmental control, and military applications, such as target identification and tracking. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Development of security in wireless sensor network using IPv6 by Jayapal, Vikneswary

    Published 2009
    “…This leads to a very demanding environment in providing security. The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Pyroelectric infrared sensor for intruder detection by Moghavvemi, M., Seng, L.C.

    Published 2004
    “…This paper discusses the application of pyroelectric infrared sensor (PIR) and the application of processing algorithm in handling sensor information so as to provide real time occupancy map on computer in control unit. …”
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal