Search Results - (( flow ((pollination algorithm) OR (selection algorithm)) ) OR ( flow encryption algorithm ))
Search alternatives:
- pollination algorithm »
- selection algorithm »
-
1
Database encryption for a Web-based Claims System
Published 2008“…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
Get full text
Thesis -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
An improved wavelet digital watermarking software implementation
Published 2011“…This includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
5
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
6
-
7
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
8
Stochastic process and tutorial of the African buffalo optimization
Published 2022“…Finally, benchmarking the good experimental output of the ABO with those of the popular, highly effective and efficient Cuckoo Search and Flower Pollination Algorithm underscores the ABO as a worthy contribution to the existing body of population-based optimization algorithms…”
Get full text
Get full text
Get full text
Article -
9
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
10
Load flow method using genetic algorithm
Published 2003“…Genetic algorithms (GAs) are search methods based on the natural selection and natural genetics, while power flow studies, commonly known as load flow, form an important part of power system analysis. …”
Get full text
Conference or Workshop Item -
11
Stochastic process and tutorial of the African bufalo optimization
Published 2022“…Finally, benchmarking the good experimental output of the ABO with those of the popular, highly effective and efficient Cuckoo Search and Flower Pollination Algorithm underscores the ABO as a worthy contribution to the existing body of population-based optimization algorithms…”
Get full text
Get full text
Get full text
Article -
12
Algorithmic approaches in model selection of the air passengers flows data
Published 2015“…Algorithm is an important element in any problem solving situation.In statistical modelling strategy, the algorithm provides a step by step process in model building, model testing, choosing the ‘best’ model and even forecasting using the chosen model.Tacit knowledge has contributed to the existence of a huge variability in manual modelling process especially between expert and non-expert modellers.Many algorithms (automated model selection) have been developed to bridge the gap either through single or multiple equation modelling.This study aims to evaluate the forecasting performances of several selected algorithms on air passengers flow data based on Root Mean Square Error (RMSE) and Geometric Root Mean Square Error (GRMSE).The findings show that multiple models selection performed well in one and two step-ahead forecast but was outperformed by single model in three step-ahead forecasts.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Implementation of a new Preference Based Final Year Project title selection system for undergraduate engineering students in UNITEN
Published 2023Subjects:Article -
15
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
16
Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia
Published 2019“…Cuckoo search), and evaluator or model inducing algorithms (e.g SVM) were utilized for feature subset selection, which further compared to select the optimal conditioning factors subset. …”
Get full text
Get full text
Thesis -
17
The Use of Artificial Neural Networks and Genetic Algorithms for Effectively Optimizing Production from Multiphase Flow Wells
Published 2010“…Moreover, the output from the ANNs will be utilized plus selected other input parameters as controlling variables for optimizing the production from a multiphase producing field using Genetic Algorithms (GA).…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2014“…Immune Network Algorithm is part of the three main algorithm in AIS. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
20
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…The CloudSim simulator is applied to evaluate each algorithm using key performance metrics, including makespan, average flow time, and the number of cloudlets that fail to meet deadlines. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
