ECG encryption enhancement with multi-layers of AES and DNA computing
The Internet of Things (IoT), which is defined as a network of interconnected computing devices, mechanical and digital machines, and objects with unique identifiers (UIDs), which are able to transmit data across a network without requiring human-to-human or human-to-computer interactions, is curren...
| Main Author: | Kh-Madhloom, Jamal |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/28271/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=123881 |
| Abstract | Abstract here |
Similar Items
Multi-agent fog computing resource management model for critical healthcare applications
by: Mutlag, Ammar Awad
Published: (2023)
by: Mutlag, Ammar Awad
Published: (2023)
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
by: Abusalama, Jawad
Published: (2025)
by: Abusalama, Jawad
Published: (2025)
Multi layer feed forward artificial neural network for learning styles identification
by: Bayasut, Bilal Luqman
Published: (2015)
by: Bayasut, Bilal Luqman
Published: (2015)
Advanced encryption standard (AES) coproessor
by: Lim, Joo Song
Published: (2025)
by: Lim, Joo Song
Published: (2025)
Modelling of n-TH order limit language using automata theory in DNA splicing system
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
Convective boundary layer flow of brinkman-viscoelastic fluid over a bluff body
by: Siti Farah Haryatie, Mohd Kanafiah
Published: (2023)
by: Siti Farah Haryatie, Mohd Kanafiah
Published: (2023)
Convective boundary layer flow and heat transfer of williamson hybrid ferrofluid with various effects
by: Wan Muhammad Hilmi, Wan Rosli
Published: (2024)
by: Wan Muhammad Hilmi, Wan Rosli
Published: (2024)
Convective boundary layer flow of viscoelastic micropolar fluid over bluff body with aligned magnetic effect
by: Laila Amera, Aziz
Published: (2024)
by: Laila Amera, Aziz
Published: (2024)
Boundary layer flow and heat transfer for Maxwell fluid and viscoelastic nanofluid over a stretching sheet
by: Nazila, Ishak
Published: (2019)
by: Nazila, Ishak
Published: (2019)
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
by: Dzakiyullah, Nur Rachman
Published: (2025)
by: Dzakiyullah, Nur Rachman
Published: (2025)
Numerical study on convective boundary layer flow and heat transfer of nanofluid over a wedge / Ruhaila Md. Kasmani
by: Ruhaila , Md. Kasmani
Published: (2016)
by: Ruhaila , Md. Kasmani
Published: (2016)
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
by: Ali, Hikma Farah
Published: (2019)
by: Ali, Hikma Farah
Published: (2019)
Statistical methods for computer aided diagnosis in chest radiography / Hossein Ebrahimian
by: Ebrahimian, Hossein
Published: (2013)
by: Ebrahimian, Hossein
Published: (2013)
Technology adoption model on cloud computing e-learning for higher education
by: Abdulsaeed, Ali A
Published: (2022)
by: Abdulsaeed, Ali A
Published: (2022)
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
by: Low, Chiau Thian
Published: (2017)
by: Low, Chiau Thian
Published: (2017)
Multi-criteria decision-making using game theory technique with application to oil production and price
by: Muhammad Akram Ramadhan, Ibrahim
Published: (2024)
by: Muhammad Akram Ramadhan, Ibrahim
Published: (2024)
Heat flux performance of heterogeneous nanofluid boundary layer flows over an inclined cylinder using variant graphene and carbon-based nanoparticles / Siti Nur Ainsyah Ghani
by: Siti Nur Ainsyah , Ghani
Published: (2021)
by: Siti Nur Ainsyah , Ghani
Published: (2021)
Novel contributions to fractional calculus: Computational methods and analysis / Mohammed K.A. Kaabar
by: Mohammed , K.A. Kaabar
Published: (2023)
by: Mohammed , K.A. Kaabar
Published: (2023)
Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin
by: Ong, Chung Sin
Published: (2013)
by: Ong, Chung Sin
Published: (2013)
Enhance Keystroke Dynamic For Online Based System
by: Teh, Teck Guan
Published: (2017)
by: Teh, Teck Guan
Published: (2017)
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
by: Rahman, Gohar
Published: (2023)
by: Rahman, Gohar
Published: (2023)
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
by: Jamal, Zalifh
Published: (2017)
by: Jamal, Zalifh
Published: (2017)
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
Enhancement of text representation for Indonesian document summarization with deep sequential pattern mining
by: Dian Sa’adillah Maylawati
Published: (2023)
by: Dian Sa’adillah Maylawati
Published: (2023)
Enhanced sentence extraction through neuro-fuzzy technique for text document summarization
by: Ahmad Kamil, Muhammad Azhari
Published: (2021)
by: Ahmad Kamil, Muhammad Azhari
Published: (2021)
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
by: Hameed, Asaad Shakir
Published: (2021)
by: Hameed, Asaad Shakir
Published: (2021)
Practicality and robustness of number right elimination testing (NRET) for multiple-choice items in paper-and-pencil testing (PPT) and computer-based testing (CBT)
by: Sie Hoe, Lau
Published: (2010)
by: Sie Hoe, Lau
Published: (2010)
A model of artificial intelligence in cyber security of scada to enhance public safety in UAE
by: Alhashmi, Omar
Published: (2023)
by: Alhashmi, Omar
Published: (2023)
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
by: Rahman, Gohar
Published: (2023)
by: Rahman, Gohar
Published: (2023)
An enhanced robust association rules method for missing values imputation in Arabic language data set
by: Salem, Awsan Thabet
Published: (2023)
by: Salem, Awsan Thabet
Published: (2023)
A new human-centric model of airport smart security system to enhance the passenger experience
by: Almarri, Ghalib Abdulla
Published: (2021)
by: Almarri, Ghalib Abdulla
Published: (2021)
Enhancing Harmony Search Parameters Based On Step And Linear Function For Bus Driver Scheduling And Rostering Problems
by: Mansor, Nur Farraliza
Published: (2018)
by: Mansor, Nur Farraliza
Published: (2018)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapi’ee
Published: (2012)
by: Jamel, Sapi’ee
Published: (2012)
Analysis performance of database programming for computation in statistical application
by: Abdul Rahid @ Abdul Rashid, Nurul Najwa
Published: (2015)
by: Abdul Rahid @ Abdul Rashid, Nurul Najwa
Published: (2015)
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
by: Yasear, Shaymah Akram
Published: (2020)
by: Yasear, Shaymah Akram
Published: (2020)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
by: Rachmawan, Ardiansa
Published: (2014)
Similar Items
-
Multi-agent fog computing resource management model for critical healthcare applications
by: Mutlag, Ammar Awad
Published: (2023) -
Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters
by: Abusalama, Jawad
Published: (2025) -
Multi layer feed forward artificial neural network for learning styles identification
by: Bayasut, Bilal Luqman
Published: (2015) -
Advanced encryption standard (AES) coproessor
by: Lim, Joo Song
Published: (2025) -
Modelling of n-TH order limit language using automata theory in DNA splicing system
by: Siti Hajar, Mohd Khairuddin
Published: (2022)
