Search Results - (( things application server algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. …”
    Get full text
    Get full text
    Article
  9. 9

    Design of monitoring and control system of electricity power limiter using internet of things by Gunoto, Pamor, Yuliansyah, Toni, Nurdin, M., Hisyamuddin, .

    Published 2025
    “…This system uses the PZM-004T sensor to measure electricity consumption by measuring current and voltage and then sending the data via the WiFi network to a cloud server. Users can access information related to electricity usage via web-based or mobile applications that provide data display in the form of a reports. …”
    Get full text
    Get full text
    Book Section
  10. 10

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Hardware prototypes using Raspberry Pi and Industrial Internet of Things components were interfaced with SCADA systems to validate real-world applicability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing by Yousafzai, Abdullah, Yaqoob, Ibrar, Imran, Muhammad, Gani, Abdullah, Noor, Rafidah Md

    Published 2020
    “…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications by Suliman Abdulmalek, Hamood Ahmed

    Published 2024
    “…Specifically, the Internet of Wearable Things (IoWT) enables wearable devices to exchange data with cloud-based IoT servers. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Deep reinforcement learning online offloading for SWIPT multiple access edge computing network by Teckchai, Tiong, Ismail Saad, Tze, Kenneth Kin Teo, Herwansyah Lago

    Published 2021
    “…More computation-intensive and low latency applications are emerging recently, and they are constrained by the computing power and battery life of internet of things (IoT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  15. 15
  16. 16
  17. 17

    Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing by Abdullah Yousafzai, Ibrar Yaqoob, Muhammad Imran, Abdullah Gani, Rafidah Md Noor

    Published 2019
    “…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…The worker or user just used the camera that has an image processing algorithm to do the sorting. The camera will be connected with the mobile devices that installed the fabric sorting application to capture all the information and quantity of garments by using the Bluetooth or server. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…Home Intruder Detection System (HIDES) is an Internet of Things (IoT) system with a mobile application to help homeowners in house surveillance by alerting users for any potential threats remotely. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20