Search Results - property distribution ((((encryption algorithm) OR (selection algorithm))) OR (based algorithm))
Search alternatives:
- property distribution »
- selection algorithm »
-
1
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
2
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Chaos-based encryption is well liked because it exhibits similarity like cryptography. …”
Get full text
Get full text
Article -
3
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Chaos-based encryption is well liked because it exhibits similarity like cryptography. …”
Get full text
Get full text
Article -
4
-
5
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
6
Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data
Published 2023“…The finding reveals that the Weibull distribution is well-suited to describing the investment behaviour of the MPS based on the estimates via the SA algorithm. …”
Get full text
Get full text
Thesis -
7
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
Get full text
Get full text
Get full text
Article -
8
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…However, decisions on block sizes and threshold selection should be made by taking into consideration the limiting distribution properties. …”
Get full text
Get full text
Thesis -
9
Feasibility of QKD over FSO Link
Published 2012“…Due to the advancements in the field of quantum computing and possible compromise of existing key-exchange algorithms, it is essential to explore performance and efficiency of new key-exchange techniques, such as Quantum Key Distribution (QKD). …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
Published 2009Get full text
Get full text
Thesis -
11
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…To encrypt the elliptical curve cryptographic (ECC) and to generate keys, the Chinese remainder theorem (CRT)-based scheme is proposed and compared with the secure hash algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
13
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Algorithmic level based methods however are based on introducing new optimization task to improve the minority class classification rate, without changing the data characteristics. …”
Get full text
Get full text
Get full text
Thesis -
14
An image-based children age range verification and classification based on facial features angle distribution and face shape elliptical ratio
Published 2017“…The classification and verification algorithm was based on face shape elliptical ratio and facial features angle distribution. …”
Get full text
Get full text
Get full text
Article -
15
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…These measurement input were then went through the process of classification in ANN to generate the most optimized models by using LM and SCG algorithm. There were seven optimized models selected out of 336 models generated from the classification process. …”
Get full text
Get full text
Thesis -
16
The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki
Published 2021“…Therefore, the purpose of this study is to facilitate the use of Forward Chaining Algorithm to calculate Faraid based on inheritance division. …”
Get full text
Get full text
Student Project -
17
Statistical modelling of time series of counts for a new class of mixture distributions / Khoo Wooi Chen
Published 2016“…Model selection based upon the Akaike Information Criterion has been performed. …”
Get full text
Get full text
Thesis -
18
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…We proposed two novel search algorithms named QuickFlood and HybridFlood. QuickFlood combines two food-based searches; fooding and teeming. …”
Get full text
Get full text
Thesis -
19
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The segmentation process was optimized using Fuzzy-based Segmentation Parameter. Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
Get full text
Get full text
Get full text
Thesis -
20
Adaptive digital watermarking system for authentication of intellectual properties
Published 2011Get full text
Get full text
Get full text
Book Chapter
