Search Results - property distribution ((factor algorithm) OR (((encryption algorithm) OR (selection algorithm))))
Search alternatives:
- property distribution »
- selection algorithm »
- factor algorithm »
-
1
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
2
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
Get full text
Get full text
Article -
3
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
Get full text
Get full text
Article -
4
Feasibility of QKD over FSO Link
Published 2012“…Due to the advancements in the field of quantum computing and possible compromise of existing key-exchange algorithms, it is essential to explore performance and efficiency of new key-exchange techniques, such as Quantum Key Distribution (QKD). …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Adaptive digital watermarking system for authentication of intellectual properties
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
-
7
Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data
Published 2023“…The finding reveals that the Weibull distribution is well-suited to describing the investment behaviour of the MPS based on the estimates via the SA algorithm. …”
Get full text
Get full text
Thesis -
8
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
9
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…A fuzzy decision-making strategy is proposed and incorporated into the Jaya algorithm as selection criteria for best and worst solutions. …”
Get full text
Get full text
Get full text
Article -
10
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
Published 2009Get full text
Get full text
Thesis -
11
Comparison between clustering algorithm for rainfall analysis in Kelantan / Wan Nurshazelin Wan Shahidan and Siti Nurasikin Abdullah
Published 2017“…So, in this study clustering algorithm on rainfall distribution dataset is done using WEKA 3.8 software. …”
Get full text
Get full text
Get full text
Article -
12
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…However, decisions on block sizes and threshold selection should be made by taking into consideration the limiting distribution properties. …”
Get full text
Get full text
Thesis -
13
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…This study utilizes genetic algorithms based upon the medoid rather than the mean as a centroid-selection schema to improve the clustering efficiency. …”
Get full text
Get full text
Thesis -
14
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…One of the most well-known and extensively utilized distributed ledger systems is the blockchain. Due to its unique properties, such as privacy, accountability, immutability, and anonymity, blockchain technology has recently attracted a lot of interest. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
A hybrid multi objective cellular spotted hyena optimizer for wellbore trajectory optimization
Published 2022“…The proposed algorithm was compared with the standard methods (MOCPSO, MOSHO, MOCGWO) and observed significant improvements in terms of better distribution of non-dominated solutions, better-searching capability, a minimum number of isolated minima, and better Pareto optimal front. …”
Get full text
Get full text
Article -
16
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…These measurement input were then went through the process of classification in ANN to generate the most optimized models by using LM and SCG algorithm. There were seven optimized models selected out of 336 models generated from the classification process. …”
Get full text
Get full text
Thesis -
18
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The results also imply that influential factors such as the length of censoring intervals and the distribution of the error terms do not significantly affect their efficiency and accuracy. …”
Get full text
Get full text
Get full text
Thesis -
19
Statistical modelling of time series of counts for a new class of mixture distributions / Khoo Wooi Chen
Published 2016“…Model selection based upon the Akaike Information Criterion has been performed. …”
Get full text
Get full text
Thesis -
20
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…However, by changing the distribution of both classes, the original classes distribution that are followed by that particular data will be violated. …”
Get full text
Get full text
Get full text
Thesis
