Search Results - (( software optimization sensor algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Investigation of the optimal sensor location and classifier for human motion classification by Anuar, Mohamed, Nur Aqilah, Othman, Hamzah, Ahmad, Mohd Hasnun Ariff, Hassan

    Published 2022
    “…In addition, this study seeks to find the best classification algorithm for human daily activities. The data recorded at these three locations were analysed using several classification algorithms in both Orange software and MATLAB. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…Compared to the Ant Colony Optimization-Genetic Algorithm (ACO-GA) and Ant Colony Optimization- Hierarchical Clustering Mechanism (ACOHCM), the ACO algorithm shows superior power savings and efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan by Khan, Muhammad Zafar Iqbal

    Published 2022
    “…The performance of the proposed routing algorithm has been evaluated through simulations of well-known software MATLAB. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Mathematical modeling for SnO2 gas sensor based on second-order response by Moshayedi, Ata Jahangir, Toudeshki, Arash Mohammadi, Gharpure, Dayamanti C.

    Published 2013
    “…The data analysis has been done with Matlab software, and Genetic algorithm is further used to optimize the transfer function parameters. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Human presence detection system by Tai, Xi Yang

    Published 2024
    “…Challenges encountered during the project include addressing sensor faults, environmental interference, and optimizing hardware and software components also have been discussed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis