Search Results - (( deployment security normalization algorithm ) OR ( java a function algorithm ))

Refine Results
  1. 1

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020 by Olanrewaju, Rashidah Funke Olanrewaju, Anwar, Farhat, Khan, Burhan Ul Islam

    Published 2019
    “…Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extent. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    SGM: Strategic Game Model for resisting node misbehaviour in IoT-Cloud ecosystem by Khan, Burhan Ul Islam, Anwar, Farhat, Abdul Rahman, Farah Diyana, Olanrewaju, Rashidah Funke, Goh, Khang Wen, Janin, Zuriati, Rahman, Md Arafatur

    Published 2022
    “…This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model’s central concept is to preclude the participation of misbehaving nodes during the routing process within the ad hoc environment of mobile IoT nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory by Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha, Yusoff, Siti Hajar

    Published 2018
    “…Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extent…”
    Get full text
    Get full text
    Monograph
  7. 7

    STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY by Olanrewaju, Rashidah Funke, Najeeb, Athaur Rahman

    Published 2018
    “…Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extent.…”
    Get full text
    Get full text
    Monograph
  8. 8

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    SGM : Strategic game model for resisting node misbehaviour in IoT-cloud ecosystem by Khan, Burhan Ul Islam, Anwar, Farhat, Farah Diyana, Abdul Rahman, Olanrewaju, Rashidah Funke, Goh, Khang Wen, Zuriati, Janin, Rahman, Md Arafatur

    Published 2022
    “…This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model’s central concept is to preclude the participation of misbehaving nodes during the routing process within the ad hoc environment of mobile IoT nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…As a result, the objectives for this project are to study the most suitable algorithms used for a movie recommender system, to implement Collaborative Filtering algorithm on a movie recommender system prototype and to test the functionality of the movie recommender system, hi this project, a movie recommendation system with the use of Collaborative Filtering is proposed to produce a set list of movies for the users. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Key features include the SMAC Hybrid A* algorithm for global path planning, the Regulated Pure Pursuit Controller for local trajectory execution and dynamic obstacle avoidance, and gmapping for SLAM functionality. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  16. 16

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Evolutionary Music; Composing Beats and Chords Progression by Ng, Hayden

    Published 2020
    “…This project focuses on delivering a JAVA application named “Evoluthm” with mainly the functions of generating chords progressions and beats. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  20. 20