Search Results - (( data protection method algorithm ) OR ( data selection method algorithm ))
Search alternatives:
- protection method »
- method algorithm »
- selection method »
- data selection »
-
1
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
2
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
3
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…The algorithm utilizes process simulator to develop plant model in order to conduct sensitivity analysis and provide dynamic data on selected fault. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Then, by means of the Slantlet Transform theory, the matrix data extraction for any decomposition level are computed and the best of them are selected as input data to feed to an effective classifier. …”
Get full text
Get full text
Thesis -
5
-
6
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. Traditional intrusion detection techniques have had trouble dealing with dynamic environments. …”
Get full text
Get full text
Get full text
Thesis -
7
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
8
Systematic Literature Review for Lightweight Authentication Algorithm in the IOT
Published 2024journal::journal article -
9
Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering
Published 2017“…Crptocurrency is a type of digital currency that using decentralized method for validating transaction. In the same time, the user of the Bitcoin is protected using hash algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
Get full text
Get full text
Thesis -
11
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…These transactions include sensitive document transfers, digital signature authentications, digital watermarking for data security protection, and digital data storage and linkages. …”
Get full text
Get full text
Get full text
Thesis -
12
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
13
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…A series of empirical studies with different benchmark data sets is conducted. The results ascertain that the proposed ensemble method is effective and efficient, outperforming many other compared methods.…”
Get full text
Get full text
Get full text
Article -
16
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and efficient violence detection algorithms has become paramount. …”
Get full text
Get full text
Get full text
Article -
17
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
18
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
19
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…Also there are many ways could be used in video encryption methods such as combining several different encryption methods with video compression to pass a secret video streaming. …”
Get full text
Get full text
Get full text
Article -
20
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article
