Search Results - (( developing security self algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. …”
    Get full text
    Get full text
    Thesis
  2. 2

    BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2010
    “…The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Evaluating Power Reliability Dedicated for Sudden Disruptions: Its Application to Determine Capacity on the Basis of Energy Security by Kosai, Shoki, Tan, Chia Kwang, Yamasue, Eiji

    Published 2018
    “…Given that a continuous power supply is fundamental to the economy and human well-being, development of a self-sustained electrical systemthat can withstand sudden disturbances by employing both renewable energy and storage technology is of significant importance. …”
    Get full text
    Get full text
    Article
  4. 4

    RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim by Osman, Mohd Nizam, Mohammad Zulrahim, Mohd Syafiq Aiman

    Published 2016
    “…This paper described a self-monitoring for wireless intrusion-detection system (IDS) using Raspberry Pi to enhance the security performance for personal computers. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Suspicious activity trigger system using YOLOv6 convolutional neural network by Suryanti, Awang, Mohd Qhairel, Rafiqi Rokei, Sulaiman, Junaida

    Published 2023
    “…Despite of having surveillance cameras (CCTV) everywhere, the crimes keep occur due to the lack of security system. The security system can be developed by utilizing the existence of CCTVs specifically home surveillance CCTV. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism by Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama

    Published 2024
    “…Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requirements. …”
    Article
  13. 13
  14. 14

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The three main objectives are: (i) to develop a malware RGB image-based dataset and classifier using a parallel CNN (PCNN), (ii) to develop an enhanced parallel deep learning (EPDL) model for malware detection (MD) and build a response system (RS) by applying PCNN, and (iii) to evaluate the developed model with previous studies based on the accuracy rate. …”
    thesis::doctoral thesis
  15. 15

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…This project is a research study on cyber hygiene during COVID-19 to avoid cyber-attacks for academic purposes. Cyber security is crucial in today's cyber defence. Cyber security expenses have increased over the past decade while massive infringements of data and data leaks have also risen. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Multi-dimensional networking and distributed computing services by Pathan, Al-Sakib Khan

    Published 2012
    “…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    SwiftCare: specialist appointment system by Yasir, Nurul Shafika Natasha

    Published 2025
    “…Made with an agile approach, the SwiftCare application has been developed on trusted platforms like Android Studio and Firebase that make it secure, scalable, and easy to navigate. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Consumers' intention to use e-money mobile using the decomposed theory of planned behavior by Husnil, Khatimah

    Published 2016
    “…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…The rationale behind developing algorithms using real encoding of chromosome representations is the limitations of binary encoding. …”
    Get full text
    Get full text
    Thesis
  20. 20

    SNR-Based OLSR Routing Protocol for Wireless Mesh Networks by Elobaid, Mohamed Elshaikh

    Published 2009
    “…The major advantages of WMNs over the other wireless networks are the low-cost, self organization, self configuration, last mile internet solution, scalability, and reliability. …”
    Get full text
    Get full text
    Thesis