Search Results - (( its location based algorithm ) OR ( _ application security algorithm ))
Search alternatives:
- its location »
-
1
-
2
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
3
-
4
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
5
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
6
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…However, further validation is required to determine its effectiveness in real-world applications.…”
Get full text
Get full text
Get full text
Thesis -
7
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
8
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
Get full text
Get full text
Thesis -
9
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
Get full text
Get full text
Thesis -
10
A hybrid algorithm of source localization based on hyperbolic technique in WSN
Published 2014“…It is therefore important to estimate a source position that minimizes its deviations from the actual position. In this paper, a hybrid method combined with maximum likelihood (ML) and genetic algorithm (GA) are proposed to determine the instantaneous position of the moving source by estimating the position and velocity based on hyperbolic techniques (TDOA and FDOA). …”
Get full text
Get full text
Conference or Workshop Item -
11
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
12
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…The proposed model is developed and simulated on Matlab based on an improved fuzzy vault scheme with a lightweight error correction algorithm to reduce the computational complexity when compared to previous work. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
Get full text
Get full text
Article -
14
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…More useful information about the attack flow provided by the routers along the attack path to the IDS, can provide higher accuracy to locate the attacker. To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
Get full text
Get full text
Thesis -
15
Front yard surveillance system: robbery scene detection
Published 2020“…First YOLO will start to detect human and car present in the video frame and store its location. When a car is detected, the car stationary time starts to measure. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Overview on fingerprinting authentication technology
Published 2020“…Fingerprint physiology makes it an ideal for biometrics authentication, primarily the tiny details located on its surface called minutiae. Fingerprint scanning systems are designed to detect minutiae. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
18
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
Get full text
Get full text
Article -
19
Autonomous path planning robot using geographical information
Published 2008“…The guidance algorithm is formed based on an initial direction and distance of the target location without considering the time taken by the robot to reach the desired destination. …”
Get full text
Learning Object -
20
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article
