Search Results - _ contributing ((((function algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
-
1
A block cipher based on genetic algorithm
Published 2016“…This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. …”
Get full text
Get full text
Get full text
Thesis -
2
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
Article -
3
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
Get full text
Get full text
Conference or Workshop Item -
4
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
Get full text
Get full text
Thesis -
5
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
6
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
7
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…Functional test is a standard testing procedure to determine the functionality of the memory by performing a sequence of read write operations to detect faults. …”
Get full text
Get full text
Thesis -
8
A comparative analysis of machine learning algorithms for diabetes prediction
Published 2024“…The study contributes insights into the importance of pre-processing and feature selection in improving algorithm performance. …”
Get full text
Get full text
Get full text
Article -
9
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…In this thesis, the Spiral Fibonacci is proposed for a permutation function to diffuse bit permutation in improving cryptography algorithm efficiency. …”
Get full text
Get full text
Thesis -
10
Smart and energy aware routing for the internet of mobile things
Published 2021“…The network simulation process is run in the CupCarbon software which is known as a smart city & IoT wireless sensor network simulator. The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…Apart from that, the proposed algorithm would also contribute to cancer-related issues upon verifying the relevancy of particular genes via technical analysis from a medical perspective and would be utilised in feature selection applications…”
Get full text
Get full text
Get full text
Article -
12
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…Thus, this system aims to solve the problems, by developing mobile navigation with safety features by taking UTeM campus as our scope of the study. The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
14
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
15
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…Therefore, the aim of this paper is to investigate which algorithm in Cocks’ Identity Based Encryption consumes high computational cost and subsequently contributes to its inefficiency. …”
Get full text
Get full text
Article -
16
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
Get full text
Get full text
Thesis -
17
AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR
Published 2013“…This study shows that this algorithm could add more value to the function of thin blood smear by eliminating the separated processes of detecting and counting parasitemia using two types of blood smears. …”
Get full text
Get full text
Final Year Project -
18
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The contributions of this study straddle research perspectives of enhancing Regression Testing with Particle Swarm-Artificial Bee Colony Algorithm, and practical perspectives by providing software testing practitioners the TCP framework that can facilitate and accelerate the production of high-quality software products by revealing faults early and reducing time, cost, and human efforts through automation.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
Hybrid Energy Encryption of Wireless Power Transfer Algorithm for Near Field Range
Published 2024thesis::doctoral thesis
