Search Results - (( evolution optimization steam algorithm ) OR ( fake communication system algorithm ))
Search alternatives:
- evolution optimization »
- optimization steam »
- fake communication »
- system algorithm »
- steam algorithm »
-
1
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…Recently, power system networks have become more dependent on new technologies especially in using a communication network to enhance the overall performance of system operation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
Get full text
Get full text
Article -
4
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…It is therefore very important that users recognize the fake website and avoid falling prey to it. In this paper, we have proposed a new encryption and decryption system to solve the lack of data hiding problem. …”
Get full text
Get full text
Student Project -
5
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
Published 2023“…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
Get full text
Get full text
Undergraduates Project Papers
