Search Results - (( development security selection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- development security »
- selection algorithm »
- security selection »
- function algorithm »
- data function »
- java »
-
1
Smart student timetable planner
Published 2025“…The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
Get full text
Get full text
Thesis -
5
Doctor-patient remote consultation system with secure medical images
Published 2022“…The smallest size with the fastest computational speed was selected and through the result, the selected algorithm was DNA encoding.…”
Get full text
Get full text
Get full text
Academic Exercise -
6
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
8
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
9
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
10
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
11
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…Existing algorithms in image security were developed based on Latin squares, DNA sequence etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…Furthermore,an AANN for power system security assessment was developed for steady state and dynamic security assessments. …”
Get full text
Get full text
Thesis -
14
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
15
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
16
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis
