Search Results - (( developing security among algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- among algorithm »
- security among »
-
1
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
Get full text
Get full text
Monograph -
3
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…The rapid growth of data breaches in the recent years contributed to standardization of encryption methods to secure storage devices. The IEEE P1619 Security in Storage working Group (SISWG) is a prominent group in developing standards related to secure storage encryption. …”
Get full text
Get full text
Thesis -
4
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
Get full text
Get full text
Get full text
Article -
5
-
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. …”
Get full text
Get full text
Student Project -
10
Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment
Published 2014“…The implementation has been carried out in such a way that quality information is acquired among the systems to demonstrate the effectiveness of decision making among events in the smart home environment.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Detection and extraction features for signatures images via different techniques
Published 2019“…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
Get full text
Get full text
Conference or Workshop Item -
12
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…As expected, the algorithm applied in this project is effective and can help users to increase their home security level. …”
Get full text
Get full text
Thesis -
13
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…Among those, motion control is a vital part of a fast, secure operation. …”
Get full text
Get full text
Get full text
Article -
14
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…In recent years, with the rapid development of social economy and the continuous improvement of people’s living standard, the awareness of security precaution is becoming increasingly important. …”
Get full text
Get full text
Get full text
Thesis -
15
Comparative analysis of firefly algorithm for solving optimization problems
Published 2017Get full text
Get full text
Book Section -
16
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…The proposed framework is expected to improve the security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. …”
Get full text
Get full text
Thesis -
17
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…Among those, motion control is a vital part of a fast, secure operation. …”
Get full text
Get full text
Get full text
Article -
18
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…Among those, motion control is a vital part of a fast, secure operation. …”
Get full text
Get full text
Get full text
Article -
19
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…Among those, motion control is a vital part of a fast, secure operation. …”
Get full text
Get full text
Get full text
Article -
20
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2022“…Among those, motion control is a vital part of a fast, secure operation. …”
Get full text
Get full text
Get full text
Article
