Search Results - (( developing security search algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- search »
-
1
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad Zamani
Published 2019“…The CISOS integrates the element of Chaotic Local Search and cloning into the original SOS algorithm. …”
Get full text
Get full text
Thesis -
2
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…Consequently, the algorithm for load increase simultaneously at several load buses was also developed in order to search the optimal value at each bus in a system such that the system can maintain a stable condition. …”
Get full text
Get full text
Thesis -
3
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The results of this study show that the proposed method which is the combination of Genetic Algorithm, Artificial Immune System (AIS) and local search has produced the desired results. …”
Get full text
Get full text
Thesis -
4
Optimal load shedding in power system using back tracking search algorithm
Published 2024text::Final Year Project -
5
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Using artificial intelligence search in solving the camera placement problem
Published 2022“…The chapter also carries out an analytical review of three main searching algorithms namely, generate and test, uninformed search, and hill climbing search algorithms. …”
Get full text
Get full text
Book -
7
Optimal placement of static VAR compensator using genetic algorithms
Published 2008“…The existence of the multiple solutions in the optimal placement of reactive power in the power system typically often get stuck at the local optimum rather than at the global optimum. Genetic Algorithms (GAs) are stochastic searching algorithms that make the searching process jumps randomly from point to point, thus allowing escape from the local optimum, and search for many sub-optimum points in parallel.This paper presents an evolutionary computation algorithm for enhancing voltage stability. …”
Get full text
Get full text
Get full text
Article -
8
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
9
-
10
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…The use of the SHA-256 hash algorithm currently considered secure and resistant to collision attacks. …”
Get full text
Get full text
Get full text
Article -
11
Development of a flexible video analysis system for motion detection and alarm generation
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
12
Driving school student management system
Published 2005“…The ways the company manage their business are too complicated.Worst case comes when there are like a hundred of student to be managed in an hour, while the company Is currently short of workers to find each customer document to be updated.As a result,a system needs to be developed to replace the current system and enhance the company's performance of management.Driving School Student Management System is proposed to handle this job.The system is developed to handle the process of secured login using Rijndael symmetric encryption algorithm,registering new student,searching a student profile and also searching for student progress to be updated using simple linear sequential search algorithm.The expected result from this system is to get the correct output for each function and system is robust and free of error.…”
Get full text
Get full text
Undergraduates Project Papers -
13
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
14
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…In this research work, a modified backpropagation neural network is combined with a modified chaos-search genetic algorithm for STLF of one day and a week ahead. …”
Get full text
Get full text
Thesis -
15
Designing substitution boxes based on chaotic map and globalized firefly algorithm
Published 2019“…The first variation of FA is called chaotic firefly algorithm (CFA), which was initialized using discrete chaotic map to enhance the algorithm to start the search from good positions. …”
Get full text
Get full text
Thesis -
16
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…Therefore, this authentication process must be further investigated to develop efficient security techniques. This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
17
-
18
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Published 2022“…The amount of data type evidence collections and security measures to secure the integrity of evidence collected are measured by evaluating available tools, developing a proof-of-concept toolkit, and comparingfunctioning tools. …”
Get full text
Get full text
Article -
19
-
20
An improved leader particle swarm optimisation algorithm for solving flexible ac transmission systems optimisation problem in power system
Published 2014“…The results of applying improved leader PSO to IEEE 14 bus power system shows its significant outperformance over six other optimisation algorithms including conventional PSO, mutated PSO, enhanced PSO, harmony search,genetic algorithm and gravitational search algorithm. …”
Get full text
Get full text
Thesis
