Search Results - probable distribution ((encryption algorithm) OR (connection algorithm))
Search alternatives:
- probable distribution »
- connection algorithm »
-
1
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
Get full text
Get full text
Article -
2
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
Get full text
Get full text
Article -
3
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…So, this study contributed to show a complete calculation and working to assist other future researchers know the complete step of the proposed scheme and reduce the probability of middle attackers and strengthen the existing algorithm with several cryptosystem integration. …”
Get full text
Get full text
Student Project -
4
Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH
Published 2021“…In recent years, photovoltaic distributed generation (PVDG) has seen rapid growth due to its benefits in supporting the power system network, enhancing the transmission and distribution of power, and minimizing power congestion. …”
Get full text
Get full text
Thesis -
5
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Finally, to improve the evaluation of the reliability, the approaches of using MAS for connection of probability with the reliability fuzzy model is proposed. …”
Get full text
Get full text
Thesis -
6
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Determining penetration limit of central distributed generation topology in radial distribution networks
Published 2021“…The voltage profiles, distributed generation capacity required, and the penetration limit have shown better performances on the central distributed generation topology over the bus dedicated distributed generation topology. …”
Get full text
Get full text
Thesis -
9
Adaptive and optimized radio resource allocation algorithms for OFDMA based networks
Published 2015“…AORAA contains an adaptive and optimized subcarrier allocation algorithm which uses graph theoretic techniques to do the best probable matching of subcarrier and users’ channel information. …”
Get full text
Get full text
Thesis -
10
Effective pilot assignment schemes in massive MIMO systems
Published 2022“…In the EPR-PPA scheme, two pilot sets are used in the network and the PPA algorithm is implemented in cells that cause low interference at the serving cell, which share the same pilot set. …”
Get full text
Get full text
Get full text
Thesis
