Search Results - (( candidate selection algorithm ) OR ( bandwidth encryption algorithm ))
Search alternatives:
- bandwidth encryption »
- selection algorithm »
-
1
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
3
A novel approach to signal encryption: improved version of conventional DSSS scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
4
A Novel Approach to Signal Encryption: Improved Version of Conventional DSSS Scheme
Published 2011“…In most of the encryption scheme, some difficulties may arise such as complexity either in encryption or decryption, expansion in required bandwidth etc. …”
Get full text
Get full text
Article -
5
Speech coding techniques and algorithms
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. …”
Get full text
Get full text
Proceeding Paper -
7
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
8
Development of security in wireless sensor network using IPv6
Published 2009“…The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
Get full text
Get full text
Thesis -
9
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
10
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
11
Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images
Published 2011“…This paper presents a new method for efficient selection of initial points for exploratory tracing algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
13
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The sorting algorithm will assist the recruiters in selecting best job candidate by assigning score to each applicants and sort the applicant list by the finest score value. …”
Get full text
Get full text
Thesis -
14
White Hole-Black Hole Algorithm
Published 2016“…The white hole is selected to be the worst candidate (star), and the black hole will be the best star at each iteration of the WH-BH algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
16
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli
Published 2022“…The purpose of this research is to apply the Fuzzy Logic approach to select candidates in companies. A real criteria position in Sony is used to validate the suggested paradigm. …”
Get full text
Get full text
Thesis -
18
Suitability Factor on the Capacitated Vehicle Routing Problem
Published 2010“…Applying elitist concept, rearrangement of candidate selection and vehicle capacity as part of its decision making can influence its achievement to reach an optimal distance.…”
Get full text
Get full text
Conference or Workshop Item -
19
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…A successor with has highest value criteria such as experiences, skills, qualification are qualified to be a candidate replacement of leadership. Selecting a successor is used subjective criteria to evaluate in higher learning of successor based on the following factors. …”
Get full text
Get full text
Thesis -
20
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Thesis
