Search Results - data distribution ((((extraction algorithm) OR (encryption algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Broken Conductor Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2013
    “…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    High Impedance Fault Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2012
    “…The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model by Sulaiman , Marizan, Adnan, Tawafan, Ibrahim, Zulkifilie

    Published 2013
    “…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…The Hill Cipher algorithm has been improved to be more secure by using a large and random key with large data block and also extending it to include the special characters. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…The algorithm for HIF detection based on the amplitude ratio of second and odd harmonics to fundamental is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The noise cancellation of the ECG signal is critical for accurate extraction of useful heart data from ECG. Additionally, the continuous flow of signals may lead to a sheer increase in the volume of the data, the ECG data needs a large memory storage device. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. …”
    Article
  15. 15

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…One of the challenging issues for a grid-connected distributed generation is to find a suitable technique to detect an islanding problem. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules by Wiliani, Ninuk

    Published 2023
    “…The second algorithm uses K Nearest Neighbour using a ratio of training data and testing data of 95:05 resulting in an accuracy value of 62%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A systematic literature review on outlier detection in wireless sensor networks by Safaei, Mahmood, Asadi, Shahla, Driss, Maha, Boulila, Wadii, Alsaeedi, Abdullah, Chizari, Hassan, Abdullah, Rusli, Safaei, Mitra

    Published 2020
    “…Therefore, an efficient local/distributed data processing algorithm is needed to ensure: (1) the extraction of precise and reliable values from noisy readings; (2) the detection of anomalies from data reported by sensors; and (3) the identification of outlier sensors in a WSN. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item