Search Results - (( developing security subject algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- security subject »
- java implication »
-
1
Hardware And Software Development Of ECG Biometric System
Published 2018Get full text
Get full text
Monograph -
2
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
Get full text
Get full text
Thesis -
3
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…However, this mechanism is vulnerable to attacks by malicious black hole nodes. The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…In recent years, with the rapid development of social economy and the continuous improvement of people’s living standard, the awareness of security precaution is becoming increasingly important. …”
Get full text
Get full text
Get full text
Thesis -
5
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…In this project, a classification system is proposed with the one-dimensional local binary pattern algorithm (1D-LBP) with the K-Nearest Neighbour (K-NN) classifier and the system is developed by using a Raspberry Pi 3.There are eight different subjects used to classify in this classification system and each subject consists of seven samples of normalized iris image as input to the system. …”
Get full text
Get full text
Monograph -
6
-
7
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…Hence, this thesis presents a new metaheuristic optimisation technique for solving optimal FACTS devices allocation problem for voltage security control. In this study, Chaotic Immune Symbiotic Organisms Search (CISOS) optimisation technique was developed with the aim of enhancing the searching capability of Symbiotic Organisms Search (SOS) technique to produce higher quality solutions. …”
Get full text
Get full text
Thesis -
8
Fingerprint frontier: the evolution of biometric security
Published 2023“…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
Get full text
Get full text
Get full text
Book -
9
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
10
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
Published 2010“…The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. …”
Get full text
Get full text
Thesis -
12
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…Consequently, these IT security issues have been a subject of intensive research in areas of computing, networking and cryptography these last few years. …”
Get full text
Get full text
Get full text
Article -
13
Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System
Published 2013“…The algorithm developed able to identify the subject come across the critical surveillance area. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
15
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Finally, we study the provable security element for both cryptosystems. Emphasis is given to the standard security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack, respectively.…”
Get full text
Get full text
Thesis -
16
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
Published 2021“…Cloud-based scientific workflows are subject to various risks, such as security breaches and unauthorized access to resources. …”
Get full text
Get full text
Article -
17
Conceptual instrumentation of washing machine for conformity to the Islamic laws of Syarak
Published 2013“…With the concept of algorithm system and integrated into the washing machine, the continuous running water will be subjected during the initial wash and spin option. …”
Get full text
Article -
18
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…The proposed CNN is tested on a finger-vein database developed in-house that contains 50 subjects with 10 samples from each finger. …”
Get full text
Get full text
Get full text
Article -
19
Conceptual instrumentation of washing machine for conformity to the Islamic laws of Syarak
Published 2013“…With the concept of algorithm system and integrated into the washing machine, the continuous running water will be subjected during the initial wash and spin option. …”
Get full text
Get full text
Article -
20
