Search Results - (( course evaluation methods algorithm ) OR ( related information security algorithms ))
Search alternatives:
- related information »
- security algorithms »
- evaluation methods »
- course evaluation »
- methods algorithm »
-
1
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
2
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
3
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
4
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…Cryptography requires a secure technique to ensure that the enemy is prevented while securing legitimate users gaining access to information. …”
Get full text
Get full text
Thesis -
5
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
6
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
7
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
Article -
10
Using web questionnaire for web-based course evaluation: advantages and disadvantages
Published 2017“…This article examines some advantages and disadvantages of conducting Web survey research especially for Web-based course evaluation at Iranian university E-learning centers. …”
Get full text
Get full text
Conference or Workshop Item -
11
Evaluate the performance of university timetabling problem with various artificial intelligence techniques
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
Get full text
Get full text
Get full text
Article -
13
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
14
-
15
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Over all, this research proposes a set of solutions to address privacy and security issues related to Modbus/TCP networks in WDS. …”
Get full text
Get full text
Thesis -
16
Doctor-patient remote consultation system with secure medical images
Published 2022“…This will make us become more vulnerable to cyber-crime and illegal data exploitation. Hence, security of our privacy information had becoming a tricky trouble to deal with. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005“…Combination of several related algorithms helps in developing the skin tones algorithm. …”
Get full text
Get full text
Final Year Project -
18
A non-blocking coordinated checkpointing algorithm for message-passing systems
Published 2015Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Graph theory approach for managing lecturers’ schedule using graph colouring method / Siti Nor Ba Basri, Nur Su’aidah Khozaid and Farhana Hazwani Ismail
Published 2023“…In this study, the scheduling problem is represented as a graph where vertices represent time slots and edges represent conflicts or dependencies between courses and lecturers. Different colours are allocated to each vertex using graph colouring techniques such as the vertices algorithm or the edges algorithm, ensuring that clashing courses and lecturers are assigned different time slots. …”
Get full text
Get full text
Student Project -
20
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis
