Search Results - (( flow ((exploration algorithm) OR (extraction algorithm)) ) OR ( flow encryption algorithm ))
Search alternatives:
- exploration algorithm »
- extraction algorithm »
-
1
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
2
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An improved wavelet digital watermarking software implementation
Published 2011“…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
Get full text
Get full text
Get full text
Book Chapter -
4
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…For future works, it was recommended to explore new heuristics P2P identification using IPFIX which will commission to become a future network flow standard by IETF.…”
Get full text
Get full text
Thesis -
5
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
6
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…This study introduces a novel meta-heuristic optimization algorithm known as quasi-oppositional modified Jaya (QOMJaya) to solve different multi-objective optimal power flow (MOOPF) problems. …”
Get full text
Get full text
Get full text
Article -
7
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
8
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
9
Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function
Published 2019“…This study aims to explore the potential of implementing multi-agent-based Genetic Algorithm (GA) with interactive metamodel to acquire regular optimisation on dynamic characteristic of traffic flow. …”
Get full text
Get full text
Get full text
Thesis -
10
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
11
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
13
Prognostic Health Management of Pumps Using Artificial Intelligence in the Oil and Gas Sector: A Review
Published 2022“…In comparison to the algorithmic approach, the data approach has not received significant research attention. …”
Get full text
Get full text
Article -
14
Optimize the maximum flow of electricity capacity using Ford Fulkerson, Edmonds Karp and Goldberg Tarjan algorithm / Nik Nur Diyana Nik Mohd Huzaidi
Published 2024“…This research explores the optimization of electricity flow using the Ford Fulkerson, Edmonds Karp, and Goldberg Tarjan algorithms. …”
Get full text
Get full text
Thesis -
15
Modelling and control strategies for hydrokinetic energy harnessing
Published 2020“…Besides, the HCS-Fuzzy MPPT algorithm improved the energy extraction up to 88.30 % as well as reduced 74.47 % the oscillation compared to the SS-HCS MPPT. …”
Get full text
Get full text
Thesis -
16
A vision-based deep learning approach for non-contact vibration measurement using (2+1)D CNN and optical flow
Published 2025“…A curated dataset was generated using a controlled experimental setup comprising a single object in a lab-scale environment, augmented synthetically to enhance frequency diversity. An optical flow-based preprocessing algorithm synchronized motion features in recorded video inputs with measured vibration labels, improving measurement accuracy. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Adapting perturbation voltage for variable speed micro-hydro using particle swarm optimization (PSO)
Published 2022“…The aim of this research is to explore a technique that can be implemented to the Variable Speed Micro-hydro Power Generation (VS-MHPG) system to search the optimum operating point for the maximum power extraction. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
19
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The HFPSO technique hybridizes the Firefly Optimization (FFO) algorithm and the Particle Swarm Optimization (PSO) method to improve the exploitation and exploration strategies and enhance the convergence rate. …”
Get full text
Get full text
Thesis -
20
Synthetic Analysis Of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2016“…The research is about creating an algorithm derived from cross-correlation theory that is being used in extracting velocity of the fluid. …”
Get full text
Get full text
Final Year Project
