scispace - formally typeset
R

Reynaldo E. Castillo

Researcher at Technological Institute of the Philippines

Publications -  15
Citations -  62

Reynaldo E. Castillo is an academic researcher from Technological Institute of the Philippines. The author has contributed to research in topics: Usability & Encryption. The author has an hindex of 4, co-authored 15 publications receiving 52 citations.

Papers
More filters
Proceedings ArticleDOI

BlockSight: A Mobile Image Encryption Using Advanced Encryption Standard and Least Significant Bit Algorithm

TL;DR: A new mobile application designed to protect images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image.
Journal ArticleDOI

TIP EXPRESS: An Android School Navigation Application

TL;DR: It was concluded that the mobile application is an effective tool in giving navigation and campus information for its users and is useful reliable, functional, and efficient to serve its purpose.
Journal ArticleDOI

A Mobile Expert System Utilizing Fuzzy Logic for Venereal and Sexually Transmitted Diseases

TL;DR: The work of developing a mobile expert system to provide information about the most common venereal and sexually transmitted diseases in the Philippines and showed that the application was able achieved the defined objectives from the outcome of the survey given to the experts and other evaluators.
Proceedings ArticleDOI

Predicting Basketball Results Using Cascading Algorithm

TL;DR: An improved technique for predicting basketball game results implementing cascading algorithm that can be used to assist basketball coaches in making plans for possible team developments and can serve as an aid in building effective gameplay.
Proceedings ArticleDOI

Integrating the Escaping Technique in Preventing Cross Site Scripting in an Online Inventory System

TL;DR: It is very vital to secure the confidentiality, availability and integrity of the data inside the system and to mitigate the vulnerability to spread widely.