Search Results - (( developing security (problems OR problem) algorithm ) OR ( java application system algorithm ))
Search alternatives:
- developing security »
- java application »
- system algorithm »
-
1
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Java is use as programming language to develop the Face Rec system and Microsoft Access as the database to store and access the fa e images for the training set. …”
Get full text
Get full text
Thesis -
2
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
3
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. However, there are problems associated with these picture-based password authentication systems such as: vulnerability to security threats, and users’ memorability of the passwords. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
6
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…The performance of the proposed CISOS technique in solving multi-objective voltage security problem as compared to SOS, PSO and EP is very significant. …”
Get full text
Get full text
Thesis -
7
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
8
OPTIMISED UNIT COMMITMENT AND DYNAMIC ECONOMIC DISPATCH FOR LARGE SCALE POWER SYSTEMS
Published 1989“…A second modelling strategy and solution algorithm for solving the same problem is also investigated. …”
Get full text
Get full text
Thesis -
9
-
10
Environmentally constraint economic dispatch and reactive power planning for ensuring secure operation in power system / Elia Erwani Hassan
Published 2015“…Hence, the RPP problem is now termed as security constrained RPP (SCRPP). …”
Get full text
Get full text
Thesis -
11
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…Therefore many are actually switching to e-commerce applications. Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Redundancy allocation for a high security control system using estimation of distribution algorithm
Published 2012Get full text
Working Paper -
13
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Recently the importance of mobile security coincides with the development of mobile computing. …”
Get full text
Get full text
Conference or Workshop Item -
14
Diagnosis security problems in cloud computing for business cloud
Published 2023“…Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security. � 2005 - 2016 JATIT & LLS. …”
Article -
15
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This study aims to design and develop security enhanced ECG system for secure and privacy-preserving, ECG diagnosing and ECG visualization. …”
Get full text
Get full text
Conference or Workshop Item -
16
Comparative analysis of firefly algorithm for solving optimization problems
Published 2017Get full text
Get full text
Book Section -
17
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…The research methodology involves problem modeling, algorithm development, and validation. …”
Get full text
Get full text
Thesis -
18
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
19
Lattice-based cryptography: the dots that provide information security
Published 2023“…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
