Search Results - (( based equation modified algorithm ) OR ( based information security algorithm ))*
Search alternatives:
- equation modified »
- based information »
- based equation »
-
1
Power System State Estimation In Large-Scale Networks
Published 2010“…The results show that AR methods managed to accurately predict the data and filter the weigthage factors for the bad measurements. Also the WLS algorithm is modified to include Unified Power Flow Controller (UPFC) parameters. …”
Get full text
Get full text
Thesis -
2
Improved Hessian approximations with modified secant equations for symmetric rank-one method
Published 2011“…In this paper, we propose some modified SR1 updates based on the modified secant equations, which use both gradient and function information. …”
Get full text
Get full text
Get full text
Article -
3
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…By modifying the existing fuzzy arithmetic operators, the constructed algorithm exceeds the positive restriction to allow the negative and near-zero LR-TFN as the coefficients of the equations. …”
Get full text
Get full text
Monograph -
4
-
5
New Quasi-Newton Equation And Method Via Higher Order Tensor Models
Published 2010“…The efficiency of the usual QN methods is improved by accelerating the performance of the algorithms without causing more storage demand. The presented equation allows the modification of several algorithms involving QN equations for practical optimization that possess superior convergence prop- erty. …”
Get full text
Get full text
Thesis -
6
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis -
7
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
8
Research on the security algorithm of reversible information hiding in communication encrypted image
Published 2021“…Considering the embedding capacity and the security of the algorithm, the paper proposes a reversible information hiding algorithm for encrypted images based on. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
10
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…The objectives of this project are to apply the encryption algorithm into these tools for securing the information collected by keystroke logging mechanism. …”
Get full text
Get full text
Student Project -
11
Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR
Published 2007“…Then fuzzy B-spline algorithm for 3D object reconstruction was modified based on the phase equation modified by weighted least square method to ensure 3 D coastal geomorphology reconstruction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Solving delay differential equations using modified 2-point block method
Published 2012“…The performance of a modified 2-point block method for solving delay differential equations (DDE) has been investigated. …”
Get full text
Get full text
Conference or Workshop Item -
13
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Mobile information security should be enhanced to new scheme that more simple and use the small key size, also high security level. …”
Get full text
Get full text
Conference or Workshop Item -
14
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
Get full text
Get full text
Thesis -
15
Memoryless modified symmetric rank-one method for large-scale unconstrained optimization
Published 2009“…Computational results, for a test set consisting of 73 unconstrained optimization problems, show that the proposed algorithm is very encouraging. Conclusion/Recommendations: In this study a memoryless QN method developed for solving large-scale unconstrained optimization problems, in which the SR1 update based on the modified QN equation have applied. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Structural Equation Modeling Algorithm and Its Application in Business Analytics
Published 2017“…Structural Equation Modeling (SEM) is a statistical-based multivariate modeling methods, Application of SEM is similar but more powerful than regression analysis; and number of scientists using SEM in their research is rupidly inereasing. …”
Get full text
Get full text
Get full text
Book Chapter -
18
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Computer information and network security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. …”
Get full text
Get full text
Thesis -
19
Symmetric Key Size for Different Level of Information Classification
Published 2006“…The classification depends on the level of damage to an organization or to national security when the information is disclosed. Therefore confidential information is normally protected by using cryptographic algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article
