Search Results - (( flow ((exploration algorithm) OR (selection algorithm)) ) OR ( flow encryption algorithm ))

Refine Results
  1. 1

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
    Get full text
    Thesis
  2. 2

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An improved wavelet digital watermarking software implementation by Khalifa, Othman Omran, Yusof, Yusnita

    Published 2011
    “…This includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  5. 5

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…For future works, it was recommended to explore new heuristics P2P identification using IPFIX which will commission to become a future network flow standard by IETF.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2018
    “…A fuzzy decision-making strategy is proposed and incorporated into the Jaya algorithm as selection criteria for best and worst solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia by Lay, Usman Salihu

    Published 2019
    “…Cuckoo search), and evaluator or model inducing algorithms (e.g SVM) were utilized for feature subset selection, which further compared to select the optimal conditioning factors subset. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Economic power dispatch solutions incorporating stochastic wind power generators by moth flow optimizer by Alam, Mohammad Khurshed, Mohd Herwan, Sulaiman, Sayem, Md. Shaoran, Khan, Rahat

    Published 2023
    “…This study's primary purpose is to apply state-of-the-art variations of the differential evolution (DE) algorithm for single-objective optimization and selected evolutionary algorithms for multi-objective optimization issues in power systems. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    The potential of a novel support vector machine trained with modified mayfly optimization algorithm for streamflow prediction by Adnan R.M., Kisi O., Mostafa R.R., Ahmed A.N., El-Shafie A.

    Published 2023
    “…Balancing; Forecasting; Stream flow; Support vector machines; Exploitation and explorations; Machine learning models; Optimisations; Optimization algorithms; Prediction modelling; Simulated annealing integrated with mayfly optimization; Streamflow prediction; Support vector regression models; Support vector regressions; Support vectors machine; Simulated annealing; algorithm; mayfly; optimization; prediction; streamflow; support vector machine; Jhelum River…”
    Article
  13. 13

    Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics by Mohammad Jarrah, Mu'ath Ibrahim

    Published 2018
    “…Optimization is a crucial process to select the best parameters in single and multi-objective problems for manufacturing process.However,it is difficult to find an optimization algorithm that obtain the global optimum for every optimization problem.Artificial Bees Colony (ABC) is a well-known swarm intelligence algorithm in solving optimization problems.It has noticeably shown better performance compared to the state-of-art algorithms.This study proposes a novel hybrid ABC algorithm with β-Hill Climbing (βHC) technique (ABC-βHC) in order to enhance the exploitation and exploration process of the ABC in optimizing carbon nanotubes (CNTs) characteristics.CNTs are widely used in electronic and mechanical products due to its fascinating material with extraordinary mechanical,thermal,physical and electrical properties. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Genetic algorithm based network coding in wireless ad hoc networks by Tan, Shee Eng

    Published 2013
    “…However, the chances to perform network coding in wireless ad hoc networks are limited if the path of packet does not flow through potential network coding nodes. Therefore, coding-aware routing is important to explore the data traffic flows with more network coding opportunities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi

    Published 2023
    “…The first step was to smooth out the data by using a filtering technique namely Savitzky-Golay to eliminate the noise of the spectrum. In order to select the most significant wavelengths, genetic algorithm (GA) was used as a forward feature selection technique. …”
    Get full text
    Get full text
    Article
  17. 17

    Numerical solution for open channel flow with submerged flexible vegetation by Yusuf, Badronnisa, Karim, O. A., Osman, S. A.

    Published 2009
    “…The modeling involved simultaneous solution of Navier Stokes equation f or o pen channel flow, s tress-strain relationship for the vegetation structure and ALE algorithm for the moving vegetation boundaries. …”
    Get full text
    Get full text
    Article
  18. 18

    Stream-flow forecasting using extreme learning machines: A case study in a semi-arid region in Iraq by Yaseen, Z.M., Jaafar, O., Deo, R.C., Kisi, O., Adamowski, J., Quilty, J., El-Shafie, A.

    Published 2016
    “…The ELM algorithm is a single-layer feedforward neural network (SLFNs) which randomly selects the input weights, hidden layer biases and analytically determines the output weights of the SLFNs. …”
    Get full text
    Get full text
    Article
  19. 19

    Exploration of ikaz and normalized hilbert transform for solving faulty in pipeline distribution system using transmission line modelling by Hanafi, M. Yusop, M. F., Ghazali, W. H., Azmi, M. F. M., Yusof, M. A., PiRemli, M. A., A. Rahim

    Published 2018
    “…EMD might be the step of decomposing the signal into intrinsic mode function, but this method have difficulties in selecting a suitable IMF. This paper proposed the uses of Integrated Kurtosisbased Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of suitable and relevant IMF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Thesis