Search Results - (( developing security force algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- force algorithm »
- security force »
-
1
-
2
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
3
Automatic prehension using an accelerometer and force sensor
Published 2005“…An accelerometer and force sensor system has been developed to monitor the gripping force and also sense the displacement of the object slippage. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of a robotic hand glove system for secure grasp with AI wireless sensor data
Published 2023“…Robotic Hand glove is one of the most commonly used technique in the rehabilitation systems. In this paper, we developed a robotic hand system with a proposed sensing mechanism-based AI algorithm, which can acquire grasping forces from human fingers. …”
Get full text
Get full text
Conference or Workshop Item -
5
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
Get full text
Get full text
Thesis -
6
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
8
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…Cryptanalysis is essential for uncovering potential vulnerabilities, as it evaluates the security of encryption schemes, identifies weaknesses, and guides the development of more secure frameworks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
-
10
An enhanced fuzzy commitment scheme in biometric template protection
Published 2023“…Phase one, involved research review and analysis, followed by designing conceptual model and algorithm development in phase two and three respectively. …”
Get full text
Get full text
Get full text
Thesis -
11
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim
Published 2016“…Hence, the result has shown the RaspyAir followed the security guidelines, fully secured, can be deployed for personal computer and significantly increase the security performance for monitoring wireless intrusion-detection system. …”
Get full text
Get full text
Get full text
Article -
13
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. …”
Get full text
Get full text
Thesis -
14
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
15
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…We developed an information system known as ‘Secured Interface System’ (Sis) that linked to the Wi-Fi infrastructure. …”
Get full text
Get full text
Get full text
Book Section -
16
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
17
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…The proposed method efficiently provides security between innovative manufacturing transactions. …”
Get full text
Get full text
Article -
18
Gripping an object based on inspection of slip events for a robotic hand model
Published 2017“…Therefore, an automatic feedback control algorithm is developed to perform re-gripping tasks based on the distance at which an object has slipped. …”
Get full text
Get full text
Get full text
Article -
19
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…MCC has raised various security concerns and delayed access due to hosting sensitive data on an untrusted cloud environment, and the control over such data by their owners is lost after uploading to the cloud. …”
Get full text
Get full text
Thesis
