Search Results - (( flow ((exploration algorithm) OR (extraction algorithm)) ) OR ( flow encryption algorithm ))

Refine Results
  1. 1

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  2. 2

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An improved wavelet digital watermarking software implementation by Khalifa, Othman Omran, Yusof, Yusnita

    Published 2011
    “…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  4. 4

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…For future works, it was recommended to explore new heuristics P2P identification using IPFIX which will commission to become a future network flow standard by IETF.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2018
    “…This study introduces a novel meta-heuristic optimization algorithm known as quasi-oppositional modified Jaya (QOMJaya) to solve different multi-objective optimal power flow (MOOPF) problems. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function by Tan, Min Keng

    Published 2019
    “…This study aims to explore the potential of implementing multi-agent-based Genetic Algorithm (GA) with interactive metamodel to acquire regular optimisation on dynamic characteristic of traffic flow. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Prognostic Health Management of Pumps Using Artificial Intelligence in the Oil and Gas Sector: A Review by Aliyu, R., Mokhtar, A.A., Hussin, H.

    Published 2022
    “…In comparison to the algorithmic approach, the data approach has not received significant research attention. …”
    Get full text
    Get full text
    Article
  14. 14

    Optimize the maximum flow of electricity capacity using Ford Fulkerson, Edmonds Karp and Goldberg Tarjan algorithm / Nik Nur Diyana Nik Mohd Huzaidi by Nik Mohd Huzaidi, Nik Nur Diyana

    Published 2024
    “…This research explores the optimization of electricity flow using the Ford Fulkerson, Edmonds Karp, and Goldberg Tarjan algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modelling and control strategies for hydrokinetic energy harnessing by Wan Ismail, Ibrahim

    Published 2020
    “…Besides, the HCS-Fuzzy MPPT algorithm improved the energy extraction up to 88.30 % as well as reduced 74.47 % the oscillation compared to the SS-HCS MPPT. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A vision-based deep learning approach for non-contact vibration measurement using (2+1)D CNN and optical flow by Harold Harrison, Mazlina Mamat, Farah Wong, Hoe Tung Yew, Racheal Lim, Wan Mimi Diyana Wan Zaki

    Published 2025
    “…A curated dataset was generated using a controlled experimental setup comprising a single object in a lab-scale environment, augmented synthetically to enhance frequency diversity. An optical flow-based preprocessing algorithm synchronized motion features in recorded video inputs with measured vibration labels, improving measurement accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Adapting perturbation voltage for variable speed micro-hydro using particle swarm optimization (PSO) by Kit, Guan Lim, Mohd Izzat Fikri Md Zainal, Min, Keng Tan, Ahmad Razani Haron, Chang, Yii Chai, Teo, Kenneth Tze Kin

    Published 2022
    “…The aim of this research is to explore a technique that can be implemented to the Variable Speed Micro-hydro Power Generation (VS-MHPG) system to search the optimum operating point for the maximum power extraction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  19. 19

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…The HFPSO technique hybridizes the Firefly Optimization (FFO) algorithm and the Particle Swarm Optimization (PSO) method to improve the exploitation and exploration strategies and enhance the convergence rate. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Synthetic Analysis Of Fluid Flow Through Particle Image Velocimetry (PIV) by Ahmad Fauzi, Marwan Asyraaf

    Published 2016
    “…The research is about creating an algorithm derived from cross-correlation theory that is being used in extracting velocity of the fluid. …”
    Get full text
    Get full text
    Final Year Project