Search Results - (( security implications based algorithm ) OR ( java implications based algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…This study underscores that building a quantum-secure digital future requires not only adopting resilient algorithms but also strengthening collaborative, adaptive, and proactive security practices.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Smart agriculture economics and engineering: Unveiling the innovation behind ai-enhanced rice farming by Chuan, Zun Liang, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, Chong, Yeh Sai

    Published 2025
    “…By employing the proposed innovative modified stacked Multiple Linear Regression-Support Vector Regression-based (MLR-SVR-based) algorithms, and ranking them utilizing the modified Taguchi-based VIseKriterijumska Optimizacija I Kompromisno Resenje (Taguchi-based VIKOR) multi-criteria decision-making algorithm, the analysis demonstrated high predictive accuracy even with limited data. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…Face-based age recognition has significant effects for a variety of purposes, including personalised services and security measures. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming by Zun Liang, Chuan, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, David Lau, King Luen, Chong, Yeh Sai

    Published 2024
    “…To address these challenges, an innovative Artificial Intelligence-based (AI-based) predictive algorithm has been proposed, leveraging the Cross Industry Standard Process for Data Mining (CRISP-DM) data science framework. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    ADAPTIVE LINEAR ALGORITHMS FOR POWER SYSTEM FUNDAMENTAL AND HARMONIC ESTIMATION by MUBARAK MOHMMED, HUSSAM ALHAJ

    Published 2015
    “…Hence, one of the objectives of this thesis is to address and enhance the introduced fundamental frequency adaptive filter method which was based on modified variable step size LMS (MVSS) algorithm using generalized square error normalized LMS algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Face detection based on Haar cascade and Convolution Neural Network (CNN) by Mohd Ariffin, Noor Afiza, Abdul Gimba, Usman, Musa, Ahmad

    Published 2025
    “…This research contributes to the ongoing advancements in facial recognition technology, with implications for enhanced security measures and intelligent human-computer interaction.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Enhancing smart city mobility using Software Defined Networks by Ahmed, Zeinab E, Hassan Abdalla Hashim, Aisha, Saeed, Rashid A, Saeed, Mamoon M

    Published 2024
    “…Future research should focus on advanced real-time traffic management algorithms, integrating emerging technologies like 6G, and artificial intelligence to improve SDN-based systems' scalability and efficiency in smart cities.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…In response, this research introduces SongketChain, a blockchain-based framework aimed at preserving the originality and enhancing the traceability and transparency of Songket production. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control by Eshtawie, Mohamed Al-Mahdi

    Published 1999
    “…Moreover, two different implication methods (Mamdani minimum and Mamdani Product) implications are used in the interpretation of the IF-THEN rules in the rule-base. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Internet of Things (IoT) applications for estrus detection and management in precision livestock farming: a review by Ashraf, Arselan, Nisa, Syed Qamrun, Ashraf, Afreen, Gunawan, Teddy Surya, Sophian, Ali

    Published 2026
    “…Overall, this review provides a comprehensive overview of IoT-based estrus detection, outlining current progress, practical implications, and recommendations for future research and implementation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Application of Artificial Intelligence In Smart City by Law, Jia Wei

    Published 2021
    “…Besides, studies and actual practices in foreign countries concluded that AI's implication brings a contribution to different sectors such as agricultural, governance, manufacturing, and medical field. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis