Search Results - (( developing insecurity _ algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development by Kehinde, Okewu, Emmanuel, Okewu, Wong, Ling Shing, Siti Sarah, Maidin

    Published 2023
    “…The application of data engineering techniques like a genetic algorithm in forecasting outcomes in plant genetics and breeding can help solve the twin problems of food insecurity and insufficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    Simulation of an adaptive artificial neural network for power system security enhancement including control action by Al-Masri, Ahmed Naufal A., Ab Kadir, Mohd Zainal Abidin, Hizam, Hashim, Mariun, Norman

    Published 2015
    “…The developed method is proved to be a steady-state security assessment tool for supplying possible control actions to mitigate an insecure situation resulting from credible contingency. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Cryptanalysis and design of chaos based image encryption schemes by Wong , Kuan Wai

    Published 2025
    “…However, many existing image encryption schemes have been shown to be insecure against cryptanalysis. Cryptanalysis is essential for uncovering potential vulnerabilities, as it evaluates the security of encryption schemes, identifies weaknesses, and guides the development of more secure frameworks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming by Zun Liang, Chuan, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, David Lau, King Luen, Chong, Yeh Sai

    Published 2024
    “…The analysis utilized a novel modified stacked Multiple Linear Regression- -Support Vector Regression (MLR- -SVR) algorithm, and a novel modified stacked MLR- -Support Vector Regression (MLR- -SVR) algorithm, demonstrating high predictive capability, especially in a limited dataset environment, which the algorithms’ superiority ranked utilizing modified Taguchi-based VIseKriterijumska Optimizacija I Kompromisno Resenje (Taguchi-based VIKOR) multi-criteria decision-making algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector by Siah, Q., Zabiri, H.

    Published 2022
    “…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
    Get full text
    Get full text
    Article
  13. 13

    Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector by Siah, Q., Zabiri, H.

    Published 2022
    “…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
    Get full text
    Get full text
    Article
  14. 14

    Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector by Siah, Q., Zabiri, H.

    Published 2022
    “…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
    Get full text
    Get full text
    Article
  15. 15

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback by MUHAMMAD ASIM

    Published 2007
    “…This scheme is also shown insecure against the differential attack in the thesis. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing predictive performance in statistical modeling: Innovative hybrid best subset feature selection for rice production in Malaysia by Chuan, Zun Liang, Abraham Lim, Bing Sern, Ren Sheng, Tham, David Lau, King Luen, Tan, Chek Cheng

    Published 2025
    “…These selected determinants aligned with the four dimensions of food security and the key pillars of the Sustainable Development Goals (SDGs). The proposed feature selection method integrates mathematics techniques, specifically the modified Taguchi-based VIseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) multicriteria decision-making (MCDM) algorithm and three performance metrics. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20