Search Results - (( developing security problem algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2
  3. 3
  4. 4

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad... by Mohamad Zamani, Mohamad Khairuzzaman

    Published 2019
    “…The performance of the proposed CISOS technique in solving multi-objective voltage security problem as compared to SOS, PSO and EP is very significant. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Recently the importance of mobile security coincides with the development of mobile computing. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This study aims to design and develop security enhanced ECG system for secure and privacy-preserving, ECG diagnosing and ECG visualization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    OPTIMISED UNIT COMMITMENT AND DYNAMIC ECONOMIC DISPATCH FOR LARGE SCALE POWER SYSTEMS by Ab Ghani, Mohd Ruddin

    Published 1989
    “…A second modelling strategy and solution algorithm for solving the same problem is also investigated. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Developing a prototype e-commerce application with credit card validation and secure transaction by M. A., Ameedeen

    Published 2005
    “…Therefore many are actually switching to e-commerce applications. Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Lattice-based cryptography: the dots that provide information security by Arif Mandangan, Hailiza Kamarulhaili, Muhammad Asyraf Asbullah, Che Haziqah Che Hussin

    Published 2023
    “…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  16. 16

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Lightweight encryption technique to enhance medical image security on internet of medical things applications by Hasan, Mohammad Kamrul, Islam, Shayla, Sulaiman, Rossilawati, Khan, Sheroz, Hassan Abdalla Hashim, Aisha, Habib, Shabana, Islam, Mohammad, Alyahya, Saleh, Ahmed, Musse Mohamed, Kamil, Samar, Hassan, Md Arif

    Published 2021
    “…However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…To solve the problem, a steganography tool is developed to help to hide the secret message before being sent through the internet. …”
    Get full text
    Get full text
    Thesis
  20. 20