Search Results - (( flow ((exploration algorithm) OR (selection algorithm)) ) OR ( flow encryption algorithm ))
Search alternatives:
- exploration algorithm »
- selection algorithm »
-
1
Database encryption for a Web-based Claims System
Published 2008“…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
Get full text
Thesis -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
An improved wavelet digital watermarking software implementation
Published 2011“…This includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
Get full text
Get full text
Get full text
Book Chapter -
5
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…For future works, it was recommended to explore new heuristics P2P identification using IPFIX which will commission to become a future network flow standard by IETF.…”
Get full text
Get full text
Thesis -
6
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
7
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…A fuzzy decision-making strategy is proposed and incorporated into the Jaya algorithm as selection criteria for best and worst solutions. …”
Get full text
Get full text
Get full text
Article -
8
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
9
Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia
Published 2019“…Cuckoo search), and evaluator or model inducing algorithms (e.g SVM) were utilized for feature subset selection, which further compared to select the optimal conditioning factors subset. …”
Get full text
Get full text
Thesis -
10
Economic power dispatch solutions incorporating stochastic wind power generators by moth flow optimizer
Published 2023“…This study's primary purpose is to apply state-of-the-art variations of the differential evolution (DE) algorithm for single-objective optimization and selected evolutionary algorithms for multi-objective optimization issues in power systems. …”
Get full text
Get full text
Get full text
Article -
11
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
12
The potential of a novel support vector machine trained with modified mayfly optimization algorithm for streamflow prediction
Published 2023“…Balancing; Forecasting; Stream flow; Support vector machines; Exploitation and explorations; Machine learning models; Optimisations; Optimization algorithms; Prediction modelling; Simulated annealing integrated with mayfly optimization; Streamflow prediction; Support vector regression models; Support vector regressions; Support vectors machine; Simulated annealing; algorithm; mayfly; optimization; prediction; streamflow; support vector machine; Jhelum River…”
Article -
13
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Optimization is a crucial process to select the best parameters in single and multi-objective problems for manufacturing process.However,it is difficult to find an optimization algorithm that obtain the global optimum for every optimization problem.Artificial Bees Colony (ABC) is a well-known swarm intelligence algorithm in solving optimization problems.It has noticeably shown better performance compared to the state-of-art algorithms.This study proposes a novel hybrid ABC algorithm with β-Hill Climbing (βHC) technique (ABC-βHC) in order to enhance the exploitation and exploration process of the ABC in optimizing carbon nanotubes (CNTs) characteristics.CNTs are widely used in electronic and mechanical products due to its fascinating material with extraordinary mechanical,thermal,physical and electrical properties. …”
Get full text
Get full text
Get full text
Thesis -
14
Genetic algorithm based network coding in wireless ad hoc networks
Published 2013“…However, the chances to perform network coding in wireless ad hoc networks are limited if the path of packet does not flow through potential network coding nodes. Therefore, coding-aware routing is important to explore the data traffic flows with more network coding opportunities. …”
Get full text
Get full text
Get full text
Thesis -
15
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
16
Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics
Published 2023“…The first step was to smooth out the data by using a filtering technique namely Savitzky-Golay to eliminate the noise of the spectrum. In order to select the most significant wavelengths, genetic algorithm (GA) was used as a forward feature selection technique. …”
Get full text
Get full text
Article -
17
Numerical solution for open channel flow with submerged flexible vegetation
Published 2009“…The modeling involved simultaneous solution of Navier Stokes equation f or o pen channel flow, s tress-strain relationship for the vegetation structure and ALE algorithm for the moving vegetation boundaries. …”
Get full text
Get full text
Article -
18
Stream-flow forecasting using extreme learning machines: A case study in a semi-arid region in Iraq
Published 2016“…The ELM algorithm is a single-layer feedforward neural network (SLFNs) which randomly selects the input weights, hidden layer biases and analytically determines the output weights of the SLFNs. …”
Get full text
Get full text
Article -
19
Exploration of ikaz and normalized hilbert transform for solving faulty in pipeline distribution system using transmission line modelling
Published 2018“…EMD might be the step of decomposing the signal into intrinsic mode function, but this method have difficulties in selecting a suitable IMF. This paper proposed the uses of Integrated Kurtosisbased Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of suitable and relevant IMF. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis
