Search Results - (( data protection method algorithm ) OR ( data optimization based algorithm ))
Search alternatives:
- protection method »
- data optimization »
- method algorithm »
-
1
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
2
-
3
-
4
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
5
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…An alternative method is proposed, utilizing machine learning algorithms. …”
text::Thesis -
6
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
7
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
Get full text
Get full text
Get full text
Article -
8
Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks
Published 2017“…A search method with numerous advantages over conventional algorithms, has been designed to solve the optimization problems with an enhanced global optimality and convergence speed. …”
Get full text
Get full text
Thesis -
9
SVM, ANN, and PSF modelling approaches for prediction of iron dust minimum ignition temperature (MIT) based on the synergistic effect of dispersion pressure and concentration
Published 2021“…For statistical phenomena, such as MIT, predictive modelling based on real-time experimental data is critical. …”
Get full text
Get full text
Article -
10
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Based on the results the proposed method is accurate in detecting islanding phenomena and effective in noisy conditions.…”
Get full text
Get full text
Thesis -
11
Robust estimation methods for fixed effect panel data model having block-concentrated outliers
Published 2019“…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
Get full text
Get full text
Thesis -
12
Hybrid optimisation electromagnetic interference shielding effectiveness:mechanical and physical performance of plaster mortar containing palm oil fuel ash using taguchi grey and t...
Published 2019“…Six factors namely POFA admixture percentage, topcoat powder /binder ratio (TP/B), water/binder ratio (W/B), latex agent content (LA), the particle size of POFA and curing condition are used to control the nine responses. Pre-experiment data is optimized based on Taguchi-grey and Flower Pollination Algorithm (FPA) methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…This standard uses AESXTS as a building block for the protection of data. For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
Get full text
Get full text
Thesis -
14
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. …”
Get full text
Get full text
Get full text
Article -
15
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
16
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
Get full text
Get full text
Thesis -
17
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…Therefore, monitoring network wells should be optimized in information-cost-effective way, based on the current groundwater quality data and vulnerability of aquifer to contamination. …”
Get full text
Get full text
Thesis -
18
Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid
Published 2012“…The optimal levels of decomposition of the stator current error signal and mother wavelet function are selected with the help of the maximum entropy and description length data. …”
Get full text
Get full text
Thesis -
19
Geographical information system (GIS) based planning technique for forest road network access : case study in Ayer Hitam Forest Reserve
Published 2016“…The current forest road was surveyed and tracked using Global Positioning System (GPS) device followed by data analysis in GIS software. For this study, Network Analysis method was used by using Cost Back Link Tool in GIS. …”
Get full text
Get full text
Project Paper Report -
20
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. …”
Article
