Search Results - (( things application testing algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  7. 7

    LoRaWAN-based hybrid internet of wearable things system implementation for smart healthcare by Abdulmalek, Suliman, Abdul Nasir, Abd Ghafar, Jabbar, Waheb A.

    Published 2024
    “…This study introduces the design and development of an Internet of Wearable Things-based Hybrid Healthcare Monitoring System (IoWT-HHMS) for smart medical applications. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Internet of wearable things-based on lora and wi-fi healthcare monitoring system for medical applications by Suliman Abdulmalek, Hamood Ahmed

    Published 2024
    “…The system underwent thorough testing, showing stable and accurate readings for vital parameters. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…Besides, the Mann-Whitney U test statistically shows a significant difference in security and computation cost between the two algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20