Search Results - (( developing security control algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…Furthermore,an AANN for power system security assessment was developed for steady state and dynamic security assessments. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Simulation of an adaptive artificial neural network for power system security enhancement including control action by Al-Masri, Ahmed Naufal A., Ab Kadir, Mohd Zainal Abidin, Hizam, Hashim, Mariun, Norman

    Published 2015
    “…The developed method is proved to be a steady-state security assessment tool for supplying possible control actions to mitigate an insecure situation resulting from credible contingency. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…Severla techniques were also implemented " such as using secure socket layer/transport layer security (SSL/TLS), secure shell (SSH) and Internet Protocol Security (IPSec)" for securing data across internet and overcoming the attacks and security because these are based on TCP/IP protocol for communication and on cryptography algorithms for the purpose of security. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad Zamani by Mohamad Zamani, Mohamad Khairuzzaman

    Published 2019
    “…Hence, this thesis presents a new metaheuristic optimisation technique for solving optimal FACTS devices allocation problem for voltage security control. In this study, Chaotic Immune Symbiotic Organisms Search (CISOS) optimisation technique was developed with the aim of enhancing the searching capability of Symbiotic Organisms Search (SOS) technique to produce higher quality solutions. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…Uniqueness of iris is proven can increase the security and efficiency of recognition system. The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Improving the security model of software define networks by Ismail Ibrahim Mohamed Almahdy

    Published 2023
    “…These security issues involves around the development to secure the SDN controller of the network, to ensure that any attacks or any unauthorized access are able to apprehend at the earliest stage. …”
    text::Final Year Project
  10. 10

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Face recognition door lock system / Danial Haziq Hakimi Salahuddin by Salahuddin, Danial Haziq Hakimi

    Published 2023
    “…The project aims to develop a secure and convenient door lock system that utilizes face recognition technology. …”
    Get full text
    Get full text
    Student Project
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20