Search Results - probable distribution ((encryption algorithm) OR (connection algorithm))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
    Get full text
    Get full text
    Article
  2. 2

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. …”
    Get full text
    Get full text
    Article
  3. 3

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…So, this study contributed to show a complete calculation and working to assist other future researchers know the complete step of the proposed scheme and reduce the probability of middle attackers and strengthen the existing algorithm with several cryptosystem integration. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Optimal planning of photovoltaic distributed generation considering uncertainties using monte carlo pdf embedded MVMO-SH by Norhafidzah, Mohd Saad

    Published 2021
    “…In recent years, photovoltaic distributed generation (PVDG) has seen rapid growth due to its benefits in supporting the power system network, enhancing the transmission and distribution of power, and minimizing power congestion. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Finally, to improve the evaluation of the reliability, the approaches of using MAS for connection of probability with the reliability fuzzy model is proposed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Malay continuous speech recognition using continuous density hidden Markov model by Ting, Chee Ming

    Published 2007
    “…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Determining penetration limit of central distributed generation topology in radial distribution networks by Suliman, Mohamed Saad Abdelgadir

    Published 2021
    “…The voltage profiles, distributed generation capacity required, and the penetration limit have shown better performances on the central distributed generation topology over the bus dedicated distributed generation topology. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive and optimized radio resource allocation algorithms for OFDMA based networks by Saadat, Md. Nazmus

    Published 2015
    “…AORAA contains an adaptive and optimized subcarrier allocation algorithm which uses graph theoretic techniques to do the best probable matching of subcarrier and users’ channel information. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Effective pilot assignment schemes in massive MIMO systems by Al-Hubaishi, Ahmed Saleh Noman

    Published 2022
    “…In the EPR-PPA scheme, two pilot sets are used in the network and the PPA algorithm is implemented in cells that cause low interference at the serving cell, which share the same pilot set. …”
    Get full text
    Get full text
    Get full text
    Thesis