Search Results - (( _ evaluation system algorithm ) OR ( between transformational issues algorithm ))
Search alternatives:
- transformational issues »
- evaluation system »
- system algorithm »
- issues algorithm »
-
1
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
2
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
Get full text
Get full text
Thesis -
3
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…Data gathering is among the issues constantly acquiring attention in the area of Wireless Sensor Networks (WSNs) due to its impact and ability to transform many areas associated with the human life. …”
Get full text
Get full text
Thesis -
4
-
5
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…One of the main challenges in the IOT system is in the security and privacy of the generated data. The major issue in the design of a security system in IOT is in the device layer. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…However, some trade-offs exist among higher performance, area implementation, and low-power design. Cryptographic algorithms are one of the most important aspects of the hardware implementation of embedded system design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
8
Electric vehicle smart charging coordination on a residential distribution grid / Norhasniza Md Razali, Hasmaini Mohamad and Zaipatimah Ali
Published 2023“…The future grid with high plug-in electric vehicles (PEVs) penetration poses great challenges to the stability of the distribution system. Power quality degradation and transformer overload are some of the critical issues that need to be addressed. …”
Get full text
Get full text
Get full text
Article -
9
Efficient reconfigurable architectures for 3-D medical image compression
Published 2010“…Despite their advantages, most 3-D medical imaging algorithms are computationally intensive with matrix transformation as the most fundamental operation involved in the transform-based methods. …”
Get full text
Get full text
Thesis -
10
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…A new algorithm using ontology and clustering methods is used to identify and correct incomplete and inconsistent data, which resolves the availability and comprehensiveness of data, similarity between data items, and missing specific attributes of data. …”
Get full text
Get full text
Get full text
Thesis -
11
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…The circular parameters between the pupil and the iris are found using current iris identification techniques but the accuracy creates an issue for the detection process during image processing. …”
Get full text
Get full text
Article -
12
Assignation of PSM evaluator using genetic algorithm
Published 2012“…The purpose of this paper is to present a design of development for Assignation of PSM Evaluator using Genetic Algorithm(APEGA)system.This is an application system that is used to assist the Faculty of Computer System and Software Engineering(FSKKP)of University Malaysia Pahang(UMP)in matching the optimum evaluators for the students in PSM presentation carnival.In the methodology part,a development model which involves with client participation is designed in order to use in the development of this project.The target user of the system is PSM coordinator who is responsible in assigning the PSM evaluator.Assignation of PSM Evaluator using Genetic Algorithm APEGA)is expected to be able in developing a well-distributed matching and overcoming the relevant constraints in an intelligent way. …”
Get full text
Get full text
Undergraduates Project Papers -
13
A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients
Published 2024“…The objective of the research is to systematically evaluate AI technology in CKD from a patient-centered perspective of care improvement for patients with CKD. …”
Get full text
Get full text
Get full text
Article -
14
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
15
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Thesis -
16
-
17
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…The most common PIV cross-correlation algorithm, the standard Fast-Fourier Transform (FFT) is evaluated by measuring the displacement of particles in synthetically generated PIV images. …”
Get full text
Get full text
Final Year Project -
18
Efficiency and accuracy of scheduling algorithms for final year project evaluation management system
Published 2023“…This research paper conducts a comparative analysis of three algorithms: genetic algorithm, hill climbing algorithm, and particle swarm optimization algorithm, with a focus on evaluating their performance in scheduling presentations. …”
Get full text
Get full text
Get full text
Article -
19
Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility
Published 2018“…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
Get full text
Get full text
Get full text
Get full text
Thesis
