Search Results - (( developing security self algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- self algorithm »
-
1
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. …”
Get full text
Get full text
Thesis -
2
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
Published 2010“…The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. …”
Get full text
Get full text
Thesis -
3
Evaluating Power Reliability Dedicated for Sudden Disruptions: Its Application to Determine Capacity on the Basis of Energy Security
Published 2018“…Given that a continuous power supply is fundamental to the economy and human well-being, development of a self-sustained electrical systemthat can withstand sudden disturbances by employing both renewable energy and storage technology is of significant importance. …”
Get full text
Get full text
Article -
4
RaspyAir: self-monitoring system for wireless intrusion detection using raspberry pi / Mohd Nizam Osman and Mohd Syafiq Aiman Mohamad Zulrahim
Published 2016“…This paper described a self-monitoring for wireless intrusion-detection system (IDS) using Raspberry Pi to enhance the security performance for personal computers. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
A Self-Adaptive Agent-Based Dynamic Processes Simulation Modelling Framework
Published 2023Conference Paper -
8
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023“…Despite of having surveillance cameras (CCTV) everywhere, the crimes keep occur due to the lack of security system. The security system can be developed by utilizing the existence of CCTVs specifically home surveillance CCTV. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
Published 2022“…In addition, the permutation algorithm is applied to ensure the security of the watermark data. …”
Get full text
Get full text
Get full text
Article -
10
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
Published 2022“…In addition, the permutation algorithm is applied to ensure the security of the watermark data. …”
Get full text
Get full text
Get full text
Article -
11
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024“…Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requirements. …”
Article -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The three main objectives are: (i) to develop a malware RGB image-based dataset and classifier using a parallel CNN (PCNN), (ii) to develop an enhanced parallel deep learning (EPDL) model for malware detection (MD) and build a response system (RS) by applying PCNN, and (iii) to evaluate the developed model with previous studies based on the accuracy rate. …”
thesis::doctoral thesis -
15
Cyber hygiene during Covid-19 to avoid cyber attacks
Published 2022“…This project is a research study on cyber hygiene during COVID-19 to avoid cyber-attacks for academic purposes. Cyber security is crucial in today's cyber defence. Cyber security expenses have increased over the past decade while massive infringements of data and data leaks have also risen. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Multi-dimensional networking and distributed computing services
Published 2012“…The multi-dimensional research issues include wireless and mobility problems, routing protocols and algorithms, resource and service location protocols, performance evaluations of networking systems, ubiquitous systems, context aware ubiquitous environment, mechanisms to improve throughput over wireless links, network management and network security, and other related areas. …”
Get full text
Get full text
Get full text
Article -
17
SwiftCare: specialist appointment system
Published 2025“…Made with an agile approach, the SwiftCare application has been developed on trusted platforms like Android Studio and Firebase that make it secure, scalable, and easy to navigate. …”
Get full text
Get full text
Student Project -
18
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
Get full text
Get full text
Get full text
Thesis -
19
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…The rationale behind developing algorithms using real encoding of chromosome representations is the limitations of binary encoding. …”
Get full text
Get full text
Thesis -
20
SNR-Based OLSR Routing Protocol for Wireless Mesh Networks
Published 2009“…The major advantages of WMNs over the other wireless networks are the low-cost, self organization, self configuration, last mile internet solution, scalability, and reliability. …”
Get full text
Get full text
Thesis
