Search Results - (( security application testing algorithm ) OR ( java application sensor algorithm ))
Search alternatives:
- security application »
- application testing »
- application sensor »
- testing algorithm »
- java application »
- sensor algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
2
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
4
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008Get full text
Get full text
Conference or Workshop Item -
5
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Fifteen files were then chosen to be the testing materials to examine the level of accuracy and security of the specific developed prototype. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
9
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
10
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
12
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
13
An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction
Published 2024“…The effectiveness of HD-AntMiner is benchmarked against established classifiers—PART and J48—as well as the conventional Ant-Miner, using public datasets and a specialized dataset of 759 Shariah-compliant securities companies in Malaysia. Utilising the Friedman test and F-score for validation, HD-AntMiner demonstrates superior performance in handling imbalanced datasets compared to other algorithms, as affirmed by the Friedman test. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
15
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
16
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
17
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
18
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
19
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
