Search Results - (( its application security algorithm ) OR ( vr application learning algorithms ))*
Search alternatives:
- application learning »
- its application »
- vr application »
-
1
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
4
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Each mobile IP agent needs a different application and independently configured. Therefore, a thorough research is to be accomplished in order to produce the mobile IP to the extent of the security features and the algorithm.…”
Get full text
Get full text
Thesis -
5
A dataset for emotion recognition using virtual reality and EEG (DER-VREEG): Emotional state classification using low-cost wearable VR-EEG headsets
Published 2022“…Secondly, we use a low-cost wearable EEG headset that is both compact and small, and can be attached to the scalp without any hindrance, allowing freedom of movement for participants to view their surroundings inside the immersive VR stimulus. Finally, we evaluate the emotion recognition system by using popular machine learning algorithms and compare them for both intra-subject and inter-subject classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
7
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
8
Eye fixation versus pupil diameter as eye- tracking features for virtual reality emotion classification
Published 2022“…The usage of eye-tracking technology is becoming increasingly popular in machine learning applications, particularly in the area of affective computing and emotion recognition. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
11
-
12
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007Get full text
Get full text
Research Reports -
13
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
14
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
15
-
16
VOICE RECOGNITION FOR SECURITY PURPOSES
Published 2007Get full text
Get full text
Final Year Project -
17
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
19
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…The significance of information security analysis and solutions has been emphasized by earlier research in several application areas. …”
Get full text
Get full text
Get full text
Article -
20
