Search Results - (( developing security subject algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…However, this mechanism is vulnerable to attacks by malicious black hole nodes. The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen by Dai , Zhen

    Published 2019
    “…In recent years, with the rapid development of social economy and the continuous improvement of people’s living standard, the awareness of security precaution is becoming increasingly important. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…In this project, a classification system is proposed with the one-dimensional local binary pattern algorithm (1D-LBP) with the K-Nearest Neighbour (K-NN) classifier and the system is developed by using a Raspberry Pi 3.There are eight different subjects used to classify in this classification system and each subject consists of seven samples of normalized iris image as input to the system. …”
    Get full text
    Get full text
    Monograph
  6. 6
  7. 7

    Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad... by Mohamad Zamani, Mohamad Khairuzzaman

    Published 2019
    “…Hence, this thesis presents a new metaheuristic optimisation technique for solving optimal FACTS devices allocation problem for voltage security control. In this study, Chaotic Immune Symbiotic Organisms Search (CISOS) optimisation technique was developed with the aim of enhancing the searching capability of Symbiotic Organisms Search (SOS) technique to produce higher quality solutions. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…This book acts as a compass to navigate the evolving landscapes of fingerprint biometrics and providing insights on the developments and innovations fueling the future. Each chapter acts as a portal, encouraging reader to explore the realms of fundamental understanding, advanced recognition algorithms, database administration complexities, and the numerous security problems that characterize the field of fingerprint biometrics. …”
    Get full text
    Get full text
    Get full text
    Book
  9. 9

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2010
    “…The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…Consequently, these IT security issues have been a subject of intensive research in areas of computing, networking and cryptography these last few years. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System by Noor Amira Syuhada, Mahamad Salleh, Kamarul Hawari, Ghazali

    Published 2013
    “…The algorithm developed able to identify the subject come across the critical surveillance area. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Finally, we study the provable security element for both cryptosystems. Emphasis is given to the standard security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack, respectively.…”
    Get full text
    Get full text
    Thesis
  16. 16

    A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud by Farid, Mazen, Latip, Rohaya, Hussin, Masnida, Abdul Hamid, Nor Asilah Wati

    Published 2021
    “…Cloud-based scientific workflows are subject to various risks, such as security breaches and unauthorized access to resources. …”
    Get full text
    Get full text
    Article
  17. 17

    Conceptual instrumentation of washing machine for conformity to the Islamic laws of Syarak by Soran Jalal, Abdullah, Basri, Ibrahim, Mohd Shahril, Othman

    Published 2013
    “…With the concept of algorithm system and integrated into the washing machine, the continuous running water will be subjected during the initial wash and spin option. …”
    Get full text
    Article
  18. 18

    Finger-Vein Biometric Identification Using Convolutional Neural Network by Syafeeza, Ahmad Radzi, Mohamed, Khalil-Hani, Rabia, Bakhteri

    Published 2016
    “…The proposed CNN is tested on a finger-vein database developed in-house that contains 50 subjects with 10 samples from each finger. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Conceptual instrumentation of washing machine for conformity to the Islamic laws of Syarak by Noordin Asimi, Mohd Noor, Basri, Ibrahim, Mohd. Hudzari, Haji Razali

    Published 2013
    “…With the concept of algorithm system and integrated into the washing machine, the continuous running water will be subjected during the initial wash and spin option. …”
    Get full text
    Get full text
    Article
  20. 20