Search Results - (( developing security (problems OR problem) algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…The performance of the proposed CISOS technique in solving multi-objective voltage security problem as compared to SOS, PSO and EP is very significant. …”
Get full text
Get full text
Thesis -
3
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
4
OPTIMISED UNIT COMMITMENT AND DYNAMIC ECONOMIC DISPATCH FOR LARGE SCALE POWER SYSTEMS
Published 1989“…A second modelling strategy and solution algorithm for solving the same problem is also investigated. …”
Get full text
Get full text
Thesis -
5
Environmentally constraint economic dispatch and reactive power planning for ensuring secure operation in power system / Elia Erwani Hassan
Published 2015“…Hence, the RPP problem is now termed as security constrained RPP (SCRPP). …”
Get full text
Get full text
Thesis -
6
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…Therefore many are actually switching to e-commerce applications. Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Redundancy allocation for a high security control system using estimation of distribution algorithm
Published 2012Get full text
Working Paper -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Recently the importance of mobile security coincides with the development of mobile computing. …”
Get full text
Get full text
Conference or Workshop Item -
9
Diagnosis security problems in cloud computing for business cloud
Published 2023“…Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security. � 2005 - 2016 JATIT & LLS. …”
Article -
10
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This study aims to design and develop security enhanced ECG system for secure and privacy-preserving, ECG diagnosing and ECG visualization. …”
Get full text
Get full text
Conference or Workshop Item -
11
Comparative analysis of firefly algorithm for solving optimization problems
Published 2017Get full text
Get full text
Book Section -
12
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…The research methodology involves problem modeling, algorithm development, and validation. …”
Get full text
Get full text
Thesis -
13
Lattice-based cryptography: the dots that provide information security
Published 2023“…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
14
Using artificial intelligence search in solving the camera placement problem
Published 2022“…Two case studies are used to evaluate those algorithms, and the camera placement problem is formulated as a coverage maximization problem. …”
Get full text
Get full text
Book -
15
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…To solve the problem, a steganography tool is developed to help to hide the secret message before being sent through the internet. …”
Get full text
Get full text
Thesis -
16
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…Rather than thinking of security as an add-on feature to software systems, security should be designed into the system from the earliest stages of requirements gathering through development, testing, integration, and deployment. …”
Get full text
Get full text
Thesis -
17
Honey bee based trust management system for cloud computing
Published 2011“…In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Lightweight encryption technique to enhance medical image security on internet of medical things applications
Published 2021“…However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis
