Search Results - (( evolution optimization steam algorithm ) OR ( fake communication system algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…Recently, power system networks have become more dependent on new technologies especially in using a communication network to enhance the overall performance of system operation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
    Get full text
    Get full text
    Article
  4. 4

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…It is therefore very important that users recognize the fake website and avoid falling prey to it. In this paper, we have proposed a new encryption and decryption system to solve the lack of data hiding problem. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection by Wong, Shu Jie

    Published 2023
    “…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
    Get full text
    Get full text
    Undergraduates Project Papers