Search Results - (( data protection method algorithm ) OR ( data normalization path algorithm ))
Search alternatives:
- data normalization »
- normalization path »
- protection method »
- method algorithm »
- path algorithm »
-
1
Wide area measurement system in the IEEE-14 bus system using multiobjective shortest path algorithm for fault analysis
Published 2021“…The distances of the normal path (without simulated fault) and the new path (with simulated fault) were recorded. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007“…Their ability as a colony to find paths or routes to the food sources has inspired the development of an algorithm namely Ant Colony System (ACS). …”
Get full text
Get full text
Conference or Workshop Item -
4
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
5
State-of-the-art in techniques of text digital watermarking: challenges and limitations
Published 2016“…Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. …”
Get full text
Get full text
Get full text
Article -
6
Protection of the texts using Base64 and MD5
Published 2012“…So using the two protection methods together will increase the security level for protecting the data.…”
Get full text
Get full text
Get full text
Article -
7
Discovering decision algorithm from a distance relay event report
Published 2009“…In helping the protection engineers deal with this overwhelming data, this study relied merely on digital protective relay’s recorded event report because, among other intelligent electronic devices, digital protective relay sufficiently provided virtually most attributes needed for data mining process in knowledge discovery in database. …”
Get full text
Get full text
Get full text
Article -
8
User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop
Published 2017“…The current methods of authentication are not secure enough to protect data from malicious users. …”
Get full text
Get full text
Student Project -
9
Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah
Published 2019“…By the path reference created by A* algorithm the robot is capable in optimizing its path to reach the designated destination. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…Interpolation scheme based on the multiaixality of stresses is suggested for the determination of coefficients of the model for different loading paths. Material parameter including stress sensitivity factor for normal or shear stress can be incorporated to improve the calibration process. …”
Get full text
Get full text
Thesis -
13
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…Moreover, an average of 22.91% for LTE-AIC with respect to normal LTE-A and 38.63% compared to LTE for high data rate. …”
Get full text
Get full text
Get full text
Thesis -
14
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Therefore, there is a need to protect the fingerprint template, especially in unsecured networks to maintain data privacy and confidentiality. …”
Get full text
Get full text
Get full text
Article -
15
A Study Of Salting Method for Image Protection
Published 2013“…This paper describes the study on benefit and importance of the implementation of Salting Method for protection of images stored in an online server database. …”
Other -
16
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
17
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
Published 2018“…We will conduct a simulation experiment of scientific workflow algorithms with both of the algorithms mentioned above. …”
Get full text
Get full text
Thesis -
18
Color Image Watermarking For Copyright Protection
Published 2005“…Watermarking is an effective and potential method for copyright protection in digital audio, image and video data. …”
Get full text
Get full text
Monograph -
19
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…Role-based access control model in materialized view has been proposed to protect customer's data. However, relying on role only is insufficient and inefficient to protect data especially sensitive attributes. …”
Get full text
Get full text
Thesis
