Search Results - (( _ application testing algorithm ) OR ( things application using algorithmic ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…In developing the algorithm for heat sensing, humidity and temperature sensor DHT 11 is used and the data of temperature is displayed in Blynk applications. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Functionality verification is done using the test case provided by National Institute Standards and Technology (NIST). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Devices that use the internet of things for DNA sequence testing also require a high level of expertise in the application of public-key cryptography. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Lightweight encryption technique to enhance medical image security on internet of medical things applications by Hasan, Mohammad Kamrul, Islam, Shayla, Sulaiman, Rossilawati, Khan, Sheroz, Hassan Abdalla Hashim, Aisha, Habib, Shabana, Islam, Mohammad, Alyahya, Saleh, Ahmed, Musse Mohamed, Kamil, Samar, Hassan, Md Arif

    Published 2021
    “…The proposed technique is analyzed, evaluated, and then compared to conventionally encrypted ones in security and execution time. Numerous test images have been used to determine the performance of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Algorithms". by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13
  14. 14
  15. 15

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20