Search Results - adoption a different ((detection algorithm) OR (encryption algorithm))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…When researchers use bending modes for the purpose of damage detection, a number of available modes are adopted, each of which return a value indicating the severity of damage. …”
    Get full text
    Get full text
    Article
  9. 9

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA) by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Ferda, Ernawan, Syifak, Izhar Hisham, Mohd Faizal, Ab Razak

    Published 2023
    “…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…In the third algorithm, a soft assignment technique using fuzzy encoding is used to transform low-level features into a higher-level feature representation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Multisensor Data Fusion Algorithm for Contactless 3D Position Measurement for Post-Stroke Hand Rehabilitation by Sophian, Ali, Md Yusof, Hazlina, Sediono, Wahju, Sudirman, Sud

    Published 2018
    “…The presence of the exercise ball in the hand adds a degree of difficulty to the problem when an optical solution is adopted. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20