Search Results - (( things application force algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Smart verification algorithm for IoT applications using QR tag by Al-Ghaili A.M., Kasim H., Rahim F.A., Ibrahim Z.-A., Othman M., Hassan Z.

    Published 2023
    “…Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things…”
    Conference Paper
  2. 2
  3. 3

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…In developing the algorithm for heat sensing, humidity and temperature sensor DHT 11 is used and the data of temperature is displayed in Blynk applications. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7