Search Results - (( developing security means algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…For secure communication that is reliable, secure, and has good performance, the focus is on developing Double Encryption System (DES). …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The research starts with developing the hybrid deep learning model consisting of DNN and a K-Means Clustering Algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Data hiding in medical images using encryption and steganography techniques by Nur Athirah, Abdul Razak

    Published 2019
    “…In this paper, for the sender side, the secret text will be encrypted using Advanced Encryption Standard algorithm and embedded into the chosen cover image using Least Significant Bit algorithm for more security. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo by Ibrahim Teo, Noor Hasimah

    Published 2005
    “…A prototype is developed using MD5 algorithm and based on prototype approach, since it study on existing system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Fingerprint recognition system : (prepocessing) by Norzaliza, Bidin

    Published 2005
    “…This project develop prototype in concentrating on the preprocessing activities which are image acquisition, threshold and thinning.The objective of this project is to make a comparison between mean value and median value of threshold and make comparison between one pass and two pass algorithm of thinning.The prototype will only use 50 pieces gray scale JPEG image with the size of 240 x 240 pixels. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean by Lorpunmanee, Siriluck, Abdullah, Abdul Razak

    Published 2007
    “…Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
    Get full text
    Article
  14. 14

    Pyroelectric infrared sensor for intruder detection by Moghavvemi, M., Seng, L.C.

    Published 2004
    “…In most of the security systems, presence detectors are used to achieve a secured home or office. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Towards developing a web application with text filtering for FTMSK : A case study for electronic exchange board / Sumardi Shukor by Shukor, Sumardi

    Published 2006
    “…Hence, this study is conducted to identify potential techniques can be used to mask the offensive words and a new textual filtering algorithm will be developed to resolve this problems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A hybrid intrusion detection system based on different machine learning algorithms by Atefi, Kayvan, Yahya, Saadiah, Dak, Ahmad Yusri, Atefi, Arash

    Published 2013
    “…Recently, Networks have developed quickly during the last many years, and attacks on network infrastructure presently are main threats against network and information security.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional firewall techniques cannot provide complete protection against intrusion. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A hybrid framework based on neural network MLP and means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate.This paper provides the conceptual view and a general framework of the proposed system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Development of an intelligent multimodal biometric system for household appliances control by Abiodun musa, Aibinu

    Published 2012
    “…In the first phase, individual biometrics recognition algorithms were developed for each biometrics feature. …”
    Get full text
    Get full text
    Get full text
    Monograph