Search Results - (( development security replication algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The three main objectives are: (i) to develop a malware RGB image-based dataset and classifier using a parallel CNN (PCNN), (ii) to develop an enhanced parallel deep learning (EPDL) model for malware detection (MD) and build a response system (RS) by applying PCNN, and (iii) to evaluate the developed model with previous studies based on the accuracy rate. …”
    thesis::doctoral thesis
  7. 7

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Finger-Vein Biometric Identification Using Convolutional Neural Network by Syafeeza, Ahmad Radzi, Mohamed, Khalil-Hani, Rabia, Bakhteri

    Published 2016
    “…Unlike existing biometric techniques such as fingerprint and face, vein patterns are inside the body, making them virtually impossible to replicate. This also makes finger-vein biometrics a more secure alternative without being susceptible to forgery, damage, or change with time. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Determination of transfer capability considering risk and reliability cost/ worth assessment in dynamic and static system cascading collapses / Nur Ashida Salim by Salim, Nur Ashida

    Published 2015
    “…The proposed research methodology involved developing an algorithm commenced with a fault occurrence and then followed by the propagation of power system component tripping events which is defined as the system cascading collapse. …”
    Get full text
    Get full text
    Thesis