Search Results - between formal algorithm

Refine Results
  1. 1

    A technique for checking the adequacy of formal model by Shkarupylo, Vadym V., Jamil Alsayaydeh, Jamil Abedalrahim, Dusheba, Valentyna V., Tomičić, Igor, Chemeris, Alexander A.

    Published 2021
    “…The technique is grounded on the following constituents: Kripke structure-for analytical interpretation of formal specification; Temporal Logic of Actions and corresponding formalism-as the instruments for shifting from the analytical plane to the implementation one; TLC model checker-to examine the correctness of formal specification – with respect to the concepts of implementation plane. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A framework for classification software security using common vulnerabilities and exposures by Hassan, Nor Hafeizah

    Published 2018
    “…This inclusive of the investigation of vulnerability classification objectives,processes,classifiers and focus domains among prominent framework.Final step is to construct the framework by establishing the formal presentation of the vulnerability classification algo-rithm.The validation process was conducted empirically using statistical method to assess the accuracy and consistency by using the precision and recall rate of the algorithm on five data sets each with 500 samples.The findings show a significant result with precision's error rate or p value is between 0.01 and 0.02 with error rate for recall's error rate is between 0.02 and 0.04.Another validation was conducted to verify the correctness of the classification by using expert opinions,and the results showed that the ambiguity of several cases were subdue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Case driven TLC model checker analysis in energy scenario by Shkarupylo, Vadym, Blinov, Ihor V., Dusheba, Valentyna, Alsayaydeh, Jamil Abedalrahim Jamil

    Published 2023
    “…Moreover, the outcomes of formal techniques and tools application directly depend on specification atomicity level chosen – as a tradeoff between the complexity of program- algorithmic constituent addressed to be represented in formal specification and available computational and spatial resources of the computing platform with model checking technique implementation – because of an exponential growth of transition system state space. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat by Mohammad Ahmad, Jomah Tubishat

    Published 2019
    “…Our results from the conducted experiments revealed that the proposed algorithm outperform the state-of-the-art aspect extraction algorithms and optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A comparative study of image compression between JPEG and wavelet by Saffor, Amhamed, Ramli, Abdul Rahman, Ng, Kwan Hoong

    Published 2001
    “…Using wavelet algorithm, a very high compression ratio of up to 600:1 was achieved.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Outbreak detection model based on danger theory by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2014
    “…As a result, an imbalance between high detection rate and low false alarm rate occurs. …”
    Get full text
    Get full text
    Article
  9. 9

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Determining Intermediary Closely Related Languages to Find a Mediator for Intertribal Conflict Resolution by Nasution, A.H., Fitri, S.E., Saian, R., Monika, W., Badruddin, N.

    Published 2022
    “…To calculate the first criteria, we implemented the Yenâ��s K algorithm to calculate the shortest path between target languages and return the path via the intermediary languages. …”
    Get full text
    Get full text
    Article
  11. 11

    An optimization technique using hybrid GA-SA algorithm for multi-objective scheduling problem by Noroziroshan, Alireza, Mohd Ariffin, Mohd Khairol Anuar, Ismail, Napsiah, Mustapha, Faizal

    Published 2011
    “…For each stage, a mathematical model formally describes the problem and the main difficulties faced are explained. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Lightweight authentication technique for secure communication of edge/fog data-centers by Yahuza, Muktar, Idris, Mohd Yamani Idna, Wahab, Ainuddin Wahid Abdul, Garba, Adamu Abdullahi, Musa, Mahadi A.

    Published 2020
    “…The security capability of the proposed scheme has been formally evaluated using the automatic cryptographic analytical tool ProVerif. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network by Rashad Mahmood, Saqib, Adnan Shahid, Khan

    Published 2022
    “…Discrete logarithm analysis shows that LEMAP is more secure compared to current security algorithms or current security algos are used as attacks against LEMAP. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. …”
    Get full text
    Get full text
    Article
  17. 17

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing selective encryption for H.264/AVC using advanced encryption standard by Abomhara, Mohamed, Zakaria, Omar, Khalifa, Othman Omran, Zaidan, Aos Alaa, Zaidan, Bilal Bahaa

    Published 2010
    “…The strength of the combination between Video compression and encryption science is due to the nonexistence of standard algorithms to be used in video compression and encrypting secret video stream. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
    Get full text
    Get full text
    Article
  20. 20

    Agent-Based Model of Virtual Community Cohesion (S/O: 13443) by Yusop, Nor Iadah, Mat Aji, Zahurin, Ab. Aziz, Azizi, Md Dahalin, Zulkhairi

    Published 2021
    “…Those relationships were then modelled using a set of mathematical equations. The formal specifications (differential equations) equations form the basis of algorithm development, which preceded the development of a virtual community cohesion prediction simulator. …”
    Get full text
    Get full text
    Monograph