Search Results - (( developing insecurity _ algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- insecurity »
-
1
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
2
-
3
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…The application of data engineering techniques like a genetic algorithm in forecasting outcomes in plant genetics and breeding can help solve the twin problems of food insecurity and insufficiency. …”
Get full text
Get full text
Get full text
Article -
5
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
A smart food security monitoring and predicting algorithm for rice productivity in Southeast Asia
Published 2025“…The rising food insecurity in Southeast Asia demands innovative and data-driven solutions. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Simulation of an adaptive artificial neural network for power system security enhancement including control action
Published 2015“…The developed method is proved to be a steady-state security assessment tool for supplying possible control actions to mitigate an insecure situation resulting from credible contingency. …”
Get full text
Get full text
Get full text
Article -
9
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…However, many existing image encryption schemes have been shown to be insecure against cryptanalysis. Cryptanalysis is essential for uncovering potential vulnerabilities, as it evaluates the security of encryption schemes, identifies weaknesses, and guides the development of more secure frameworks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming
Published 2024“…The analysis utilized a novel modified stacked Multiple Linear Regression- -Support Vector Regression (MLR- -SVR) algorithm, and a novel modified stacked MLR- -Support Vector Regression (MLR- -SVR) algorithm, demonstrating high predictive capability, especially in a limited dataset environment, which the algorithms’ superiority ranked utilizing modified Taguchi-based VIseKriterijumska Optimizacija I Kompromisno Resenje (Taguchi-based VIKOR) multi-criteria decision-making algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector
Published 2022“…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
Get full text
Get full text
Article -
13
Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector
Published 2022“…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
Get full text
Get full text
Article -
14
Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector
Published 2022“…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
Get full text
Get full text
Article -
15
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
16
A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback
Published 2007“…This scheme is also shown insecure against the differential attack in the thesis. …”
Get full text
Get full text
Thesis -
17
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
18
Enhancing predictive performance in statistical modeling: Innovative hybrid best subset feature selection for rice production in Malaysia
Published 2025“…These selected determinants aligned with the four dimensions of food security and the key pillars of the Sustainable Development Goals (SDGs). The proposed feature selection method integrates mathematics techniques, specifically the modified Taguchi-based VIseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) multicriteria decision-making (MCDM) algorithm and three performance metrics. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article
