Search Results - (( mobile reduction methods algorithm ) OR ( rate information security algorithm ))

Refine Results
  1. 1

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Enhanced algorithm for energy-saving mechanism and frame response time reduction in IEEE 802.16e WiMAX by Baker, Alaa M.

    Published 2010
    “…Mobile Units have many constraints for reliable communication in today’s mobile environments. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Mobility management schemes based on multiple criteria for optimization of seamless handover in long term evolution networks by Hussein, Yassein Soubhi

    Published 2014
    “…The results demonstrated that our proposed method results in significant reductions of HOF, HOPP and packet loss ratio (PLR) compared to the conventional HHO and enhanced weighted performance HO parameter optimization (EWPHPO) algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach by Gholizadeh, Somayyeh

    Published 2018
    “…Furthermore, Optimized Parametric Topology Control Routing algorithm performs significantly better than Triangular Routing Method and Change Foreign Agent Algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin by Engku Safruddin, Engku Maryam Syahdina

    Published 2018
    “…Total average for bit error rate of 30 images is 0.59233. Average above 0.5 prove that the level of security encryption and decryption is very high and secure.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    PAPR Reduction Using Genetic Algorithm (GA) In OFDM System by Mohd Ramdan, Fatin Najwa Nursyadza

    Published 2018
    “…In order to reduce the PAPR performance in OFDM system, many reduction technique are explored. In this thesis, a Genetic algorithm (GA) technique is proposed. …”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…The security of sensitive information against ‘prying eyes’ has been of prime concern throughout the centuries. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs by Ayoob, Ayoob A., Norrozila, Sulaiman, Mohammed, Muamer N., Ghaida M., Abdilsahib

    Published 2014
    “…This paper presented a new algorithm using DSR routing cache technique to improve the routing between mobile nodes to reduction the effect of mobility in link transmitting that can solve link broken problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…The present situation demands extremely secured details of patients. Consequently, securing the patient's information from ransomware is the main challenge in the healthcare industry. …”
    Get full text
    Get full text
    Article
  13. 13

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…The matching/recognition performance evaluation produced higher verification rates and a low false rejection rate. The rates were 99.10 % and 0.90%, respectively. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Improvement and application of particle swarm optimization algorithm by Deevi, Durga Praveen, Kodadi, Sharadha, Allur, Naga Sushma, Dondapati, Koteswararao, Chetlapalli, Himabindu, Perumal, Thinagaran

    Published 2025
    “…Finally, real-world tests are performed to verify the proposed Algorithm's efficacy compared to existing optimization methods. …”
    Get full text
    Get full text
    Article