Search Results - (( based estimation methods algorithm ) OR ( related information security algorithm ))*
Search alternatives:
- related information »
- estimation methods »
- methods algorithm »
- based estimation »
-
1
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
Get full text
Get full text
Get full text
Thesis -
2
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
3
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
4
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
Get full text
Get full text
Get full text
Book Chapter -
5
An improved scatter search algorithm for parameter estimation in large-scale kinetic models of biochemical systems
Published 2019“…The improved algorithm is based on hybridization of quasi opposition-based learning in enhanced scatter search (QOBLESS) method. …”
Get full text
Get full text
Get full text
Article -
6
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The proposed method inherits the robustness properties of the original RFCH estimators. …”
Get full text
Get full text
Thesis -
7
Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE
Published 2014“…To eliminate all of the disadvantages of the classic IC algorithm, we developed a new IC controller based on a fuzzy duty cycle change estimator with direct control. …”
Get full text
Article -
8
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…Cryptography requires a secure technique to ensure that the enemy is prevented while securing legitimate users gaining access to information. …”
Get full text
Get full text
Thesis -
9
LEMABE: a novel framework to Improve analogy-based software cost estimation using learnable evolution model
Published 2021“…Then, MMRE, PRED (0.25), and MdMRE criteria have been used to evaluate and compare the proposed method against other evolutionary algorithms. Employing the proposed method showed considerable improvement in estimating software cost estimation.…”
Get full text
Get full text
Article -
10
An Improved Scatter Search Algorithm for Parameter Estimation in Large-Scale Kinetic Models of Biochemical Systems
Published 2019“…Based on the results, the QOBLESS method can be used as an efficient parameter estimation method in large-scale kinetic model building.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
State estimation of the power system using robust estimator
Published 2016“…In this study, a new robust algorithm based on the quasi weighted least squares (QWLS) estimator is presented. …”
Get full text
Get full text
Conference or Workshop Item -
12
An Adaptive Motion Estimation Algorithm for Irregular Motion of Objects
Published 2014Get full text
Get full text
Conference or Workshop Item -
13
Improvement Of Local-Based Stereo Vision Disparity Map Estimation Algorithm
Published 2017“…Firstly, the proposed SVDM algorithm combines three matching cost features based on per pixel differences. …”
Get full text
Get full text
Thesis -
14
Multiple equations model selection algorithm with iterative estimation method
Published 2016“…This estimation method is equivalent to maximum likelihood estimation at convergence. …”
Get full text
Get full text
Get full text
Article -
15
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
16
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…There are many types of motion estimation method but the most used method is the block matching method which is the fixed block matching and the variable block matching. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A new algorithm to estimate attenuation using frequency shift methods
Published 2012“…This paper presents the improvement of quality factor (Q) estimation using shift frequency method. A new method was developed based on two previous methods; peak frequency shift (PFS) method and centroid frequency shift (CFS) method. …”
Get full text
Get full text
Get full text
Article -
19
Dynamic robust bootstrap method based on LTS estimators
Published 2009“…We call this method Dynamic Robust Bootstrap-LTS based (DRBLTS) because here we have employed the LTS estimator in the modified bootstrap algorithm. …”
Get full text
Get full text
Article -
20
Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks
Published 2016“…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
Get full text
Get full text
Get full text
Thesis
