Search Results - (( _ application tools algorithm ) OR ( based applications security algorithm ))*
Search alternatives:
- based applications »
- application tools »
- tools algorithm »
-
1
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
5
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
7
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…Based on the atmospheric physical model, this research proposed a haze removal algorithm using improved restoration model based on dark channel prior, which has good robustness to the bright sky regions, and also has a good effect on the edges. …”
Get full text
Get full text
Get full text
Thesis -
9
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
10
An optimal tasks scheduling algorithm based on QoS in cloud computing network
Published 2017“…Therefore, if the resource is from the first group then map the average length task to it and if the choosing resource is from the second group, then map the largest length task to it. The simulation tool used for testing the algorithm is WorkflowSim. …”
Get full text
Get full text
Thesis -
11
-
12
Real-time power system dynamic security assessment based on advanced feature selection for decision tree classifiers
Published 2017“…This paper proposed a novel algorithm based on advanced feature selection technique for decision tree (DT) classifier to assess the dynamic security in power system. …”
Get full text
Get full text
Get full text
Article -
13
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…Finally, a software tool based on an adaptive neural network for power system security assessment was developed. …”
Get full text
Get full text
Thesis -
14
-
15
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
16
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…Secondly, the application and modification of a Jaya algorithm to deal with different OPF problems is presented. …”
Get full text
Get full text
Thesis -
17
Development of DNA-based dynamic key-dependent block cipher
Published 2015Get full text
Get full text
Thesis -
18
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
20
