Search Results - (( developing security detection algorithm ) OR ( java application interface algorithm ))
Search alternatives:
- developing security »
- security detection »
- java application »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…However, every single tool has different ways of detection and accuracy of the detection. This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
4
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
5
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…Then, the percentage of detection accuracy was used to compare the detection performance of all five algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
8
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
Article -
9
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005“…The main focus of the system is to ensure that the motion can be detected only using the skin tones. Combination of several related algorithms helps in developing the skin tones algorithm. …”
Get full text
Get full text
Final Year Project -
10
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
11
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
12
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
14
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A security payment model for financial payment using mykad
Published 2011“…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
17
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
Get full text
Get full text
Journal -
18
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
20
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
