Search Results - (( Flow extraction algorithm ) OR ( Flow encryption algorithm ))
Search alternatives:
- extraction algorithm »
- flow extraction »
-
1
An improved wavelet digital watermarking software implementation
Published 2011“…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
Get full text
Get full text
Get full text
Book Chapter -
2
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
3
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
4
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
5
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
6
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
8
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
11
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…This study introduces a novel meta-heuristic optimization algorithm known as quasi-oppositional modified Jaya (QOMJaya) to solve different multi-objective optimal power flow (MOOPF) problems. …”
Get full text
Get full text
Get full text
Article -
12
Synthetic Analysis Of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2016“…The research is about creating an algorithm derived from cross-correlation theory that is being used in extracting velocity of the fluid. …”
Get full text
Get full text
Final Year Project -
13
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
14
A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images
Published 2010“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Article -
15
-
16
Fingerprint classification : a BI-resolution approach to singular point extraction
Published 2004“…The result of this algorithm is very promising.…”
Get full text
Get full text
Thesis -
17
QUANTITATIVE SCHLIEREN MEASUREMENT OF 3 DIMENSIONAL TEMPERATURE, CONCENTRATION AND VELOCITY FIELDS IN A GAS FLOW
Published 2011“…The developed deflection vector estimation algorithm and optical tomography served as a tool to extract the index of refraction of the gaseous fields. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A Study on Implementing Physiology-Based Approach and Optical Flow Algorithm to Thermal Screening System for Flu Detection
Published 2015“…To solve this issue, we have proposed a combination of physiology-based and optical flow algorithm to extract vascular network from the face. …”
Get full text
Get full text
Get full text
Article -
19
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
20
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Thesis
