Search Results - (( variable information security algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- variable information »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The security of sensitive information against ‘prying eyes’ has been of prime concern throughout the centuries. …”
Get full text
Get full text
Thesis -
3
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. …”
Get full text
Get full text
Get full text
Thesis -
4
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
8
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
An enhanced fingerprint template protection scheme
Published 2022“…Currently, most existing FTP schemes fail to meet the properties of fingerprint authentication systems, namely diversity, revocability, security, and match/recognition performance, due to intra-user variability in fingerprint identifiers and matching issues in unencrypted domains. …”
Get full text
Get full text
Thesis -
10
Hardware implementation of RC4A stream cipher
Published 2009“…Implementation of cryptographic algorithms on hardware runs faster than on software and at the same time offering more intrinsic security. …”
Get full text
Get full text
Get full text
Article -
11
Predicting wheat yield from 2001 to 2020 in Hebei Province at county and pixel levels based on synthesized time series images of Landsat and MODIS
Published 2024“…To obtain seasonable and precise crop yield information with fine resolution is very important for ensuring the food security. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…In particular, it is simultaneously assesses the determinants of consumers’ intention to use e-money mobile in Indonesia which examines twelve (12) variables. The variables are attitude, awareness, subjective norm, perceived behavioral control, perceived risk, perceived security, relative advantage, complexity, social-cultural influence, family, self-confidence, and resources facilitating conditions. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Zero distortion-based steganography for handwritten signature
Published 2018Get full text
Get full text
Get full text
Thesis -
18
Power System State Estimation In Large-Scale Networks
Published 2010“…Its optimal performance is required in order to operate the power system in a safe, secure and economic manner. State estimators (SE) process the available measurements by taking into account the information about the network model and parameters. …”
Get full text
Get full text
Thesis -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
20
A new integrated approach for evaluating sustainable development in the electric vehicle sector
Published 2025“…The truncated regression analysis shows that innovation performance in Taiwan's EV industry is significantly influenced by energy management, data security, employee information statistics, and control over equity and board seats. …”
Get full text
Get full text
Get full text
Get full text
Article
