Search Results - (( things adoption optimization algorithm ) OR ( java application rsa algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Sarawak is transitioning to green energy adoption, yet progress is hindered by a lack of comprehensive spatial data to identify optimal locations, inadequate optimization techniques for effective integration of these sites, and insufficient robust Industrial Internet of Things-based real-time monitoring and automation strategies to manage the intermittent nature of green energy resources. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
    Get full text
    Get full text
    Article
  9. 9

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    The role of the interface and interface management in the optimization of BIM multi-model applications: a review by Hmidah, Nawal Abdunasseer, Haron, Nuzul Azam, Alias, Aidi Hizami, Law, Teik Hua, Altohami, Abubaker Basheer Abdalwhab, Raja Ahmad Effendi, Raja Ahmad Azmeer

    Published 2022
    “…This review targets the BIM interface, the BIM multi-model approach, and the role of employing algorithms in BIM optimization to introduce the need for automation in the BIM technique, instead of complicating manual procedures in order to reduce possible errors. …”
    Get full text
    Get full text
    Article
  11. 11

    A survey on the design aspects and opportunities in age-aware UAV-aided data collection for sensor networks and Internet of Things applications by Amodu, Oluwatosin Ahmed, Nordin, Rosdiadee, Jarray, Chedia, Bukar, Umar Ali, Raja Mahmood, Raja Azlina, Othman, Mohamed

    Published 2023
    “…Numerous studies have proposed solutions to overcome the above-mentioned challenges, including adopting several optimization and machine learning (ML) algorithms for diverse architectural setups to minimize the AoI. …”
    Get full text
    Get full text
    Article
  12. 12

    Multi-objective dynamic job shop scheduling optimization in manufacturing systems: A short review by Ullah, Wasif, Mohd Fadzil Faisae, Ab Rashid, Hammad, Muhammad Yahya

    Published 2025
    “…A critical review of current methodologies reveals that achieving sustainability necessitates balancing the inherent time versus cost/energy trade-off, driving the adoption of metaheuristics like Genetic Algorithms (GA) and advanced Deep Reinforcement Learning (DRL) for adaptive policy generation. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network by Zareei, M., Mohamed, E.M., Anisi, M.H., Rosales, C.V., Tsukamoto, K., Khan, M.K.

    Published 2016
    “…Due to our routing design specification, such as power consideration and low delay, it can be suitable to be adopted for Internet of Things applications.…”
    Get full text
    Get full text
    Article
  14. 14

    An improved hybrid method combined with a cloud-based supervisory control to facilitate smooth coordination under low-inertia grids by Yiizzan, Suffian, Ahmed Mohamed, Ahmed Haidar, Wan Azlan, Wan Zainal Abidin, Hazrul, Mohamed Basri

    Published 2025
    “…For this reason, the paper proposed an optimized hybrid generalized droop method combined with a cloud-based supervisory control using the Internet of Things (IoT) to facilitate smooth transitions and maintain system stability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Non-Intrusive Electrical Load Monitoring and Identification: Approaches, Tools and a Case Study by Elixie A.E., Alkahtani A.A., Alkawsi G., Salle S.F., Fazea Y., Ekanayake J.

    Published 2023
    “…This paper adopts a non-intrusive load monitoring algorithm (NILM) to assist in generating a recommender system based on smart meter data. …”
    Article
  16. 16
  17. 17

    SGM: Strategic Game Model for resisting node misbehaviour in IoT-Cloud ecosystem by Khan, Burhan Ul Islam, Anwar, Farhat, Abdul Rahman, Farah Diyana, Olanrewaju, Rashidah Funke, Goh, Khang Wen, Janin, Zuriati, Rahman, Md Arafatur

    Published 2022
    “…The core of the design is a simplified mathematical algorithm that can strategically compute payoff embrace moves to maximise gain. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    SGM : Strategic game model for resisting node misbehaviour in IoT-cloud ecosystem by Khan, Burhan Ul Islam, Anwar, Farhat, Farah Diyana, Abdul Rahman, Olanrewaju, Rashidah Funke, Goh, Khang Wen, Zuriati, Janin, Rahman, Md Arafatur

    Published 2022
    “…The core of the design is a simplified mathematical algorithm that can strategically compute payoff embrace moves to maximise gain. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19