Search Results - (( java implementation bat algorithm ) OR ( program information security algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. It is recommended that Final Examination Question Papers be enhanced using Encryptor Application by applying AES on a different domain to further strengthen information security.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms by -, Salma, Olanrewaju, Rashidah Funke, Abdullah, Khaizuran, -, Rusmala, Darwis, Herdianti

    Published 2019
    “…The importance of cloud computing comes out with the security of data accessibility, reliability and reliability of information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Improving the security model of software define networks by Ismail Ibrahim Mohamed Almahdy

    Published 2023
    “…An by securing the connection between the main controller and northbound administration with the use of certain algorithm hashing protocol, it would further increase the security of the command line in the whole network. …”
    text::Final Year Project
  11. 11
  12. 12

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The programming language that is used to write the program is Java Language.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…The aggregatable signcryption that enables special signcryption ciphertexts intended for the same destination be assembled in a compressed single ciphertext while maintaining the same security standards in the system. The procedure is then obfuscated aimed at making information more difficult to be understood by human being for the purpose of security and privacy of the program/information while commonly maintaining its computational functions. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems by Sinnanaidu, Subba Rao

    Published 2004
    “…In this thesis, a Peer Security Framework (PSF) has been developed using reputation-based mechanism to address these problems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…In summary, the results obtained in this study offer accurate and high-speed information for the dynamic security state, which makes DSA classifier able to provide vital information for protection and control applications to keep the power system in a secure and reliable state.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…In addition, the objective is to tighten the security of Windows platform by implementing a new way of encrypting users' information to prevent access by unauthorized users. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    WEBCAM MOTION DETECTION USINGVISUAL BASIC by Abdullah, Ilyana

    Published 2005
    “…This system is able to be upgraded to be amonitoring system for security purposes. The project adds the number of motion detection collection programs that available in the market. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20