Search Results - different ((((extraction algorithm) OR (encryption algorithm))) OR (optimisation algorithm))
Search alternatives:
- optimisation algorithm »
- extraction algorithm »
-
1
A shift column different offset for better Rijndael security
Published 2009“…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
Get full text
Get full text
Get full text
Article -
2
Plant leaf recognition algorithm using ant colony-based feature extraction technique
Published 2013“…Then, based on the characteristics of each species, decision making is done by means of ant colony optimisation as a search algorithm to return the optimal subset of features regarding the related species. …”
Get full text
Get full text
Thesis -
3
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
4
An improvement of back propagation algorithm using halley third order optimisation method for classification problems
Published 2020“…This algorithm utilises first order optimisation method namely Gradient Descent (GD) method which attempts to minimise the error of network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…Therefore, an improved feature extraction and selection for sky image classification (FESSIC) algorithm is proposed. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
EEG-based emotion recognition using machine learning algorithms
Published 2024“…Thus, this project proposed an optimised machine learning algorithms to classify emotion by analysing brain activity using Electroencephalogram (EEG) signals. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Then the results are compared to the average energy dissipation (μJ) by applying different encryption data, AES, SF and SIT algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
13
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…Proposed algorithm AES, has a different key sizes ,as 128,192 and 256. …”
Get full text
Get full text
Thesis -
14
Financial trading using learning-based approach
Published 2022“…For each time interval, an autoencoder consisting of InceptionTime and Long Short-Term Memory (LSTM) was trained to perform feature extraction. The reinforcement learning algorithms applied include Advantage Actor-Critic (A2C), Proximal Policy Optimisation (PPO), and Twin Delayed Deep Deterministic Policy Gradient (TD3). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
16
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
17
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
19
Gateway placement optimisation problem for mobile multicast design in wireless mesh networks
Published 2012“…Thus, the main focus in this work centres on investigating IGW placement optimisation with the intent of extracting the design issues to answer questions on the appropriateness of the problem formulation and modeling techniques for the optimisation problem. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis
