Search Results - (( developing security alert algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Network intrusion detection and alert system by To, Jin Yi

    Published 2024
    “…This project aims to develop an intelligent and comprehensive network intrusion detection and alert system (NIDAS) to enhance network security and provide real-time threat mitigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Microcontroller-based face recognition system with web-based application for car security by Arumugam P., Ker P.J., Tan J.Y., Mani D.

    Published 2023
    “…Hardware and software designs were carried out to develop a car security system using microcontroller-based face recognition system. …”
    Article
  3. 3

    Genetic algorithm for event scheduling system by Hasan Basari, Abd Samad, Hussin, Burairah, Jalal, Siti Musliza, Mohd Isa, Nabihah

    Published 2010
    “…Some researches about another existing Event Alert Sytem are carried to provide more understanding to the system to be developed. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Suspicious activity trigger system using YOLOv6 convolutional neural network by Suryanti, Awang, Mohd Qhairel, Rafiqi Rokei, Sulaiman, Junaida

    Published 2023
    “…Despite of having surveillance cameras (CCTV) everywhere, the crimes keep occur due to the lack of security system. The security system can be developed by utilizing the existence of CCTVs specifically home surveillance CCTV. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This study aims to design and develop security enhanced ECG system for secure and privacy-preserving, ECG diagnosing and ECG visualization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Steady state security analysis using artificial neural network by Mohd Nor, Nurul Huda

    Published 2008
    “…The cases where operating violations are observed are considered as alert , while the cases for which the load flow algorithm exhibits a diverging algorithmically solution, are considered as emergency. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. …”
    Article
  10. 10

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…Detection techniques against attacks on computer networks must be continuously developed so that integrity, availability and confidentiality on a computer network become more secure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Real time monitoring system for elderly by Wong, Jo Yeng

    Published 2024
    “…This project is notable for using Raspberry Pi, GPS and advanced fall detection algorithms for accurate tracking. Software was developed using the Geany IDE for versatility and seamless integration in numerous care scenarios. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    A hybrid algorithm of source localization based on hyperbolic technique in WSN by Kabir, H., Kanesan, J., Reza, A.W., Ramiah, H.

    Published 2014
    “…Electromagnetic (EM) source localization has become a vital issue lately to improve civilian safety, increase the military security and mitigate the disaster effect. The localization is embedded in battle-field surveillance, traffic alert, emergency call 911 (E911), resource allocation and mitigation of disaster effect. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. A system is developed to predict the risk of users based on their behaviour when they are online using real-life behavioural data obtained from a private university’s 207 undergraduates. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Smart wireless pedestrian detection by Mohd Jasrim, Nur Zulaikha, Md Taujuddin, Nik Shahidah Afifi, Suhaila Sari, Suhaila Sari

    Published 2024
    “…The detection of humans using Haar Cascade algorithm technique was done in Raspbian OS by using Python coding. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17