Search Results - (( flows implications algorithm ) OR ( flow encryption algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  3. 3

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…Research limitations/implications: This paper has examined the issues of MPP optimization in a reconfigurable manufacturing framework with the help of a reconfigurable multiparts manufacturing flow line. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images by Al-Azzawi, Alaa Khamees, Saripan, M. Iqbal, Jantan, Adznan, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
    Get full text
    Get full text
    Article
  12. 12

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimization of hybrid flow shop scheduling in a machine shop: Achieving energy efficiency and minimizing machine idleness with multi-objective Tiki Taka optimization by Siti Nurhazwani Husna, Mohd Hata, Muhammad Ammar, Nik Mu’tasim, Mohd Fadzil Faisae, Ab Rashid

    Published 2025
    “…The optimization result was compared to established algorithms, such as the Non-dominated Sorting Genetic Algorithm-II, the Multi Objectives Evolutionary Algorithm Based on Decomposition, the Multi Objectives Particle Swarm Optimization, and the recent algorithm Multi Objectives Grey Wolf Optimizer. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Optimization ofhybrid flow shop scheduling in a machine shop: Achieving energy efficiency and minimizing machine idleness with multi-objective Tiki Taka optimization by Siti Nurhazwani Husna, Mohd Hata, Muhammad Ammar, Nik Mu’tasim, Mohd Fadzil Faisae, Ab Rashid

    Published 2025
    “…Overall, the findings have important implications for Hybrid flow shop scheduling in terms of the energy utilization model, reducing idle machine time, and the promising potential of MOTTA for application in other combinatorial scheduling challenges. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    CO2 flow in saline aquifer with salt precipitation by Pau, J.S., Pao, W., Yong, S.P.

    Published 2016
    “…The random data are linearized to obtain the relationship between salt precipitate and CO2 saturation and implemented to the algorithm for two-phase flow in CO2 and brine system. …”
    Get full text
    Get full text
    Article
  16. 16

    CO2 flow in saline aquifer with salt precipitation by Pau, J.S., Pao, W., Yong, S.P.

    Published 2016
    “…The random data are linearized to obtain the relationship between salt precipitate and CO2 saturation and implemented to the algorithm for two-phase flow in CO2 and brine system. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique contains three approaches; first approach is string encryption. The string encryption is about adding a mathematical equation with arrays and loops to the strings in the code to hide the meaning. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Novel approach for streamflow forecasting using a hybrid ANFIS-FFA model by Yaseen, Z.M., Ebtehaj, I., Bonakdari, H., Deo, R.C., Danandeh Mehr, A., Mohtar, W.H.M.W., Diop, L., El-Shafie, A., Singh, V.P.

    Published 2017
    “…It is construed that the FFA optimizer can thus surpass the accuracy of the traditional ANFIS model in general, and is able to remove the false (inaccurately) forecasted data in the ANFIS model for extremely low flows. The present results have wider implications not only for streamflow forecasting purposes, but also for other hydro-meteorological forecasting variables requiring only the historical data input data, and attaining a greater level of predictive accuracy with the incorporation of the FFA algorithm as an optimization tool in an ANFIS model.…”
    Get full text
    Get full text
    Article
  20. 20