Search Results - (( developing security means algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- means algorithm »
- security means »
-
1
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
Get full text
Get full text
Thesis -
2
A new 128-bit block cipher
Published 2009“…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
Get full text
Get full text
Thesis -
3
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For secure communication that is reliable, secure, and has good performance, the focus is on developing Double Encryption System (DES). …”
Get full text
Get full text
Get full text
Thesis -
4
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The research starts with developing the hybrid deep learning model consisting of DNN and a K-Means Clustering Algorithm. …”
Get full text
Get full text
Thesis -
5
Data hiding in medical images using encryption and steganography techniques
Published 2019“…In this paper, for the sender side, the secret text will be encrypted using Advanced Encryption Standard algorithm and embedded into the chosen cover image using Least Significant Bit algorithm for more security. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
7
-
8
A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Published 2005“…A prototype is developed using MD5 algorithm and based on prototype approach, since it study on existing system. …”
Get full text
Get full text
Thesis -
9
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
10
-
11
Fingerprint recognition system : (prepocessing)
Published 2005“…This project develop prototype in concentrating on the preprocessing activities which are image acquisition, threshold and thinning.The objective of this project is to make a comparison between mean value and median value of threshold and make comparison between one pass and two pass algorithm of thinning.The prototype will only use 50 pieces gray scale JPEG image with the size of 240 x 240 pixels. …”
Get full text
Get full text
Undergraduates Project Papers -
12
-
13
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
Published 2007“…Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
Get full text
Article -
14
Pyroelectric infrared sensor for intruder detection
Published 2004“…In most of the security systems, presence detectors are used to achieve a secured home or office. …”
Get full text
Conference or Workshop Item -
15
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Towards developing a web application with text filtering for FTMSK : A case study for electronic exchange board / Sumardi Shukor
Published 2006“…Hence, this study is conducted to identify potential techniques can be used to mask the offensive words and a new textual filtering algorithm will be developed to resolve this problems. …”
Get full text
Get full text
Thesis -
18
A hybrid intrusion detection system based on different machine learning algorithms
Published 2013“…Recently, Networks have developed quickly during the last many years, and attacks on network infrastructure presently are main threats against network and information security.With quickly growing unauthorized activities in network Intrusion Detection as a part of defense is extremely necessary because traditional firewall techniques cannot provide complete protection against intrusion. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A hybrid framework based on neural network MLP and means clustering for intrusion detection system
Published 2013“…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate.This paper provides the conceptual view and a general framework of the proposed system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…In the first phase, individual biometrics recognition algorithms were developed for each biometrics feature. …”
Get full text
Get full text
Get full text
Monograph
