Search Results - (( developing nation security algorithm ) OR ( java implication bees algorithm ))

Refine Results
  1. 1

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  2. 2

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…Moreover, the development of ARSA makes this model more secure and safer for the customers.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Secure block cipher inspired by the human immune system by Ariffin, Suriyani

    Published 2012
    “…As for Malaysia, it is an advantage if we can develop our own symmetric block cipher for our national security interest. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming by Zun Liang, Chuan, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, David Lau, King Luen, Chong, Yeh Sai

    Published 2024
    “…Subsequently, the selected superior modified stacked ensemble MLR-SVR-based algorithms are utilized to forecast the 5-year future rice production for each low-middle and upper-middle Southeast Asia nation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
    Get full text
    Get full text
    Journal
  8. 8
  9. 9

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…The algorithms are tested for randomness and security by using the National Institute of Standards and Technology (NIST) statistical tests within nine datasets in the third and final rounds. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm by Che Pa, Noraziah, Hashim, Nor Laily, Yusof, Yuhanis, Hussain, Azham

    Published 2016
    “…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development by Kehinde, Okewu, Emmanuel, Okewu, Wong, Ling Shing, Siti Sarah, Maidin

    Published 2023
    “…The aim of this work is to address malnutrition, immune deficiency, hunger, and poverty as canvassed in United Nations Sustainable Development Goals 1 and 2 (SDGs 1 and 2). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise by Chuan, Zun Liang, Abraham Lim, Bing Sern, Tan, Chek Cheng, Abdul Aziz, Jemain, Liong, Choong-Yeun

    Published 2025
    “…Furthermore, this study aligns with the United Nations Sustainable Development Goals (SDGs), particularly SDG9 (Industry, Innovation, and Infrastructure), by fostering Artificial Intelligence (AI)-driven forensic advancements and SDG16 (Peace, Justice, and Strong Institution) by strengthening forensic accuracy in criminal investigations, ultimately contributing to national security and judicial efficiency.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    The pre-process of smart grid algorithm design for network centric air operation during crisis management / Kritsana Sukdee ... [et al]. by Kritsana, Sukdee, Wattanapong, Rakwichian, Watchara, Wongpanyo, Bunyawat, Vichanpol, Chatkaew, Chailuecha

    Published 2016
    “…As in effect to the developing countries as similar as the Association of Southeast Asian Nations (ASEAN) because these energy resources are still used widely and high demand for supporting micro-economic level. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Extreme gradient boosting (XGBoost) regressor and shapley additive explanation for crop yield prediction in agriculture by Dennis A/L Mariadass, Ervin Gubin Moung, Maisarah Mohd Sufian, Ali Farzamnia

    Published 2022
    “…To increase the nation's food security, policymakers must rely on accurate crop yield predictions in order to easily obtain trade - related evaluations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  20. 20