Search Results - (( developing security force algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Automatic prehension using an accelerometer and force sensor by Ahmad, Siti Anom, Chappell, Paul H., Ali, Mohd Liakot

    Published 2005
    “…An accelerometer and force sensor system has been developed to monitor the gripping force and also sense the displacement of the object slippage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Development of a robotic hand glove system for secure grasp with AI wireless sensor data by Almassri, Ahmed, Koyanagi, Ken'ichi, Wada, Chikamune, Horio, Keiichi, Wan Hasan, Wan Zuha

    Published 2023
    “…Robotic Hand glove is one of the most commonly used technique in the rehabilitation systems. In this paper, we developed a robotic hand system with a proposed sensing mechanism-based AI algorithm, which can acquire grasping forces from human fingers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Cryptanalysis and design of chaos based image encryption schemes by Wong , Kuan Wai

    Published 2025
    “…Cryptanalysis is essential for uncovering potential vulnerabilities, as it evaluates the security of encryption schemes, identifies weaknesses, and guides the development of more secure frameworks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    An enhanced fuzzy commitment scheme in biometric template protection by Taqiyah Khadijah, Ghazali

    Published 2023
    “…Phase one, involved research review and analysis, followed by designing conceptual model and algorithm development in phase two and three respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Mohd Faizal, Ab Razak

    Published 2023
    “…The novelty of our study lies in the Force Atlas 2 call graph development to capture malware behavior patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim by Osman, Mohd Nizam, Mohammad Zulrahim, Mohd Syafiq Aiman

    Published 2016
    “…Hence, the result has shown the RaspyAir followed the security guidelines, fully secured, can be deployed for personal computer and significantly increase the security performance for monitoring wireless intrusion-detection system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Multistage quality control in manufacturing process using blockchain with machine learning technique by Gu, J., Zhao, L., Yue, X., Arshad, N.I., Mohamad, U.H.

    Published 2023
    “…The proposed method efficiently provides security between innovative manufacturing transactions. …”
    Get full text
    Get full text
    Article
  18. 18

    Gripping an object based on inspection of slip events for a robotic hand model by Al-Shanoon, Abdulrahman Abdulkareem Sattoori, Ahmad, Siti Anom, Hassan, Mohd Khair

    Published 2017
    “…Therefore, an automatic feedback control algorithm is developed to perform re-gripping tasks based on the distance at which an object has slipped. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…MCC has raised various security concerns and delayed access due to hosting sensitive data on an untrusted cloud environment, and the control over such data by their owners is lost after uploading to the cloud. …”
    Get full text
    Get full text
    Thesis