Search Results - (( course evaluation methods algorithm ) OR ( rate information security algorithm ))*
Search alternatives:
- evaluation methods »
- course evaluation »
- methods algorithm »
- rate information »
-
1
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Total average for bit error rate of 30 images is 0.59233. Average above 0.5 prove that the level of security encryption and decryption is very high and secure.…”
Get full text
Get full text
Thesis -
3
-
4
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
5
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
6
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The security of sensitive information against ‘prying eyes’ has been of prime concern throughout the centuries. …”
Get full text
Get full text
Thesis -
7
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The present situation demands extremely secured details of patients. Consequently, securing the patient's information from ransomware is the main challenge in the healthcare industry. …”
Get full text
Get full text
Article -
8
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
9
An enhanced fingerprint template protection scheme
Published 2022“…The matching/recognition performance evaluation produced higher verification rates and a low false rejection rate. The rates were 99.10 % and 0.90%, respectively. …”
Get full text
Get full text
Thesis -
10
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
11
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
13
Improving intrusion detection using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
17
Design of information hiding algorithm for multi-link network transmission channel
Published 2019“…The average time spent on hiding information is 2.04 s, indicating that the algorithm has high information hiding rate and storage efficiency.…”
Get full text
Get full text
Get full text
Article -
18
Using web questionnaire for web-based course evaluation: advantages and disadvantages
Published 2017“…This article examines some advantages and disadvantages of conducting Web survey research especially for Web-based course evaluation at Iranian university E-learning centers. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Evaluate the performance of university timetabling problem with various artificial intelligence techniques
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis
