Search Results - (( based applications security algorithm ) OR ( _ application means algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Unmanned aerial vehicles (UAV) have enormous potential in enabling new applications in various areas, ranging from communication, military, security, to traffic-monitoring applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon by Lew , Chee Hon

    Published 2017
    “…This thesis proposed a digital text based watermarking algorithm combined with Pseudo-Random Number Generator(PRNG) for cryptography application. …”
    Get full text
    Get full text
    Get full text
    Thesis