Search Results - (( developing nation security algorithm ) OR ( java implication bees algorithm ))
Search alternatives:
- java implication »
- implication bees »
- nation security »
- bees algorithm »
-
1
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
2
A security payment model for financial payment using mykad
Published 2011“…Moreover, the development of ARSA makes this model more secure and safer for the customers.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Secure block cipher inspired by the human immune system
Published 2012“…As for Malaysia, it is an advantage if we can develop our own symmetric block cipher for our national security interest. …”
Get full text
Get full text
Thesis -
6
Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming
Published 2024“…Subsequently, the selected superior modified stacked ensemble MLR-SVR-based algorithms are utilized to forecast the 5-year future rice production for each low-middle and upper-middle Southeast Asia nation. …”
Get full text
Get full text
Conference or Workshop Item -
7
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
Get full text
Get full text
Journal -
8
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
9
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…The algorithms are tested for randomness and security by using the National Institute of Standards and Technology (NIST) statistical tests within nine datasets in the third and final rounds. …”
Get full text
Get full text
Thesis -
10
-
11
Sustainable energy management: Artificial intelligence-based electricity consumption prediction in limited dataset environment for industry applications
Published 2024“…Electricity has been a key driver of global socioeconomic development and sustainability for both developed and developing nations. …”
Get full text
Get full text
Get full text
Article -
12
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app.The proposed model operates using Firefly multi-objective optimization algorithm that creates an optimal schedule for the relocation of victims and resources for an evacuation centre.The proposed decision aid model and the adaptive system can be applied in supporting the National Security Council’s respond mechanisms for handling disaster management level II (State level) especially in providing better management of the flood evacuating centres.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Secure E-Voting With Blind Signature
Published 2003Get full text
Get full text
Conference or Workshop Item -
14
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
15
Adaptive emergency evacuation centre management for dynamic relocation of flood victims using firefly algorithm
Published 2016“…This study undergoes two main phases; development of algorithm and models, and development of a web-based and mobile app. …”
Get full text
Get full text
Get full text
Article -
16
Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development
Published 2023“…The aim of this work is to address malnutrition, immune deficiency, hunger, and poverty as canvassed in United Nations Sustainable Development Goals 1 and 2 (SDGs 1 and 2). …”
Get full text
Get full text
Get full text
Article -
17
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…Furthermore, this study aligns with the United Nations Sustainable Development Goals (SDGs), particularly SDG9 (Industry, Innovation, and Infrastructure), by fostering Artificial Intelligence (AI)-driven forensic advancements and SDG16 (Peace, Justice, and Strong Institution) by strengthening forensic accuracy in criminal investigations, ultimately contributing to national security and judicial efficiency.…”
Get full text
Get full text
Get full text
Article -
18
The pre-process of smart grid algorithm design for network centric air operation during crisis management / Kritsana Sukdee ... [et al].
Published 2016“…As in effect to the developing countries as similar as the Association of Southeast Asian Nations (ASEAN) because these energy resources are still used widely and high demand for supporting micro-economic level. …”
Get full text
Get full text
Get full text
Article -
19
Extreme gradient boosting (XGBoost) regressor and shapley additive explanation for crop yield prediction in agriculture
Published 2022“…To increase the nation's food security, policymakers must rely on accurate crop yield predictions in order to easily obtain trade - related evaluations. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
Design and implementation of advanced encryption standard using verilog HDL
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
