Search Results - (( _ application drops algorithm ) OR ( iot application ((rsa algorithm) OR (bee algorithm)) ))*

Refine Results
  1. 1

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance evaluation of lightweight Crypto functions for Internet of things applications by Jaleel, Nubila, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2020
    “…The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    On determination of input parameters of the mass transfer process by fuzzy approach. by Maan, Normah, Talib, Jamalludin, Arshad, Khairil Annuar, Ahmad, Tahir

    Published 2005
    “…This is an extension of the work done on the mass transfer process of a single drop in single stage RDC column. The algorithm is based on fuzzy approach and the assumptions made in mass transfer process as adopted in previous work are also being used. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Hybrid model to improve the river streamflow forecasting utilizing multi-layer perceptron-based intelligent water drop optimization algorithm by Pham Q.B., Afan H.A., Mohammadi B., Ahmed A.N., Linh N.T.T., Vo N.D., Moazenzadeh R., Yu P.-S., El-Shafie A.

    Published 2023
    “…Complex networks; Drops; Forecasting; Iterative methods; Network architecture; Network layers; Optimization; Rivers; Stochastic models; Stochastic systems; Stream flow; Time series; Engineering applications; Gradient-decent algorithm; Intelligent Water Drops (IWD); Multi layer perceptron; Multi-layer perceptron neural networks; Optimization algorithms; Streamflow forecasting; Time series prediction; Multilayer neural networks…”
    Article
  14. 14
  15. 15
  16. 16

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…In this thesis rain streak have been captured and isolated from the background scene by using an embossed filter algorithm designed to highlight the transparent rain streaks that cause the blur and distortion of the video, while the removing algorithm is based on a simple algorithm that correlates spatio-temporal and depth of an image into one technique. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20