ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Computing
Technology
Industrial engineer
Pure sciences
Mechanical Engineering
Architecture and Urbanism
Biology
Research
Communication
all records (53)

Languages
English
German

Countries
Indonesia
USA
India
Ukraine
Bosnia Herzegovina
Switzerland
Iraq
Austria
Canada
Turkey, Turkish Republic
all records (36)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (20)

Filter  
 
662  Articles
1 of 67 pages  |  10  records  |  more records»
Recent developments in smart healthcare have brought us a great deal of convenience. Connecting common objects to the Internet is made possible by the Internet of Things (IoT). These connected gadgets have sensors and actuators for data collection and tra... see more

Internet of Things merupakan suatu deskripsi dari jaringan fisik atau ”things” yang dipasang menggunakan sensor, software dan teknologi lain dengan tujuan menghubungkan dan menukarkan data antar divisi dan sistem lain menggunakan internet. Internet of Thi... see more

Keamanan data informasi menjadi permasalahan yang cukup serius, informasi yang dianggap rahasia memerlukan keamanan yang tinggi sehingga apabila terdapat pihak ketiga yang dapat mengakses data penyimpanan tanpa seizin pemilik. Kasus yang terjadi terhadap ... see more

Due to the rapid development and rapid popularization of the information technology, internet and digital media have become an important tool for military, commercial, individuals and many other organizations to obtain and transmit information. However, d... see more

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly use... see more

Blockchain is used as encryption algorithm in cryptocurrency, but less researches are found to study blockchain for data encryption. Data encryption is needed to protect the data from data theft. We know about data encryption, there are RSA, LEAP, AES, an... see more

Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems. Therefore, for various security reasons, we use various method... see more

Cryptography is an encryption technique, where the data to be encrypted will be encrypted using a key to become data that is difficult to read by other parties who do not have a decryption key. The DES algorithm is a symmetric block cipher cryptographic a... see more

Security of medical images is critical for transmission of medical images and relevant patient information through public health information systems networks. Image encryption is an important tool for protecting Medical images by converting them into unre... see more

1 of 67 pages  |  10  records  |  more records»