Search Results - (( development based interception algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- interception algorithm »
- based interception »
- development based »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
An efficient likelihood-based modulation classification algorithm for multiple-input multiple-output systems
Published 2016“…To overcome the problems associated with the existing likelihood-based MC algorithms, a new algorithm is developed in this paper. …”
Get full text
Get full text
Article -
3
Development of algorithm for single axis sun tracking system
Published 2016“…In this paper, the focus is on the integration of solar tracking system with performance analyzer system through the development of an algorithm for optimizing the performance of SEGS. …”
Get full text
Get full text
Conference or Workshop Item -
4
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…Current AES standards are applied to encrypt and protect and the content of motion images being transmitted as to minimize un-authorized access or interception. This paper outlines the possible weaknesses within the current AES encryption algorithm especially against algebraic based cryptanalysis. …”
Conference paper -
6
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
7
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
8
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
FT-IR- based metabolomics approach to characterize the α-glucosidase inhibitory activity of Salak fruit
Published 2017“…Thus, this study was conducted to evaluate α-glucosidase inhibitory activity of Salak fruit extracts and Fourier Transform Infrared spectroscopy (FT-IR)-based fingerprinting with combination of orthogonal partial least-squares (OPLS) was applied to develop a rapid method for quality control of this fruit. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). …”
Get full text
Get full text
Get full text
Article -
11
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This paper presents an efficient and effective framework for the design and development of enhanced selective video encryption scheme for H.264/AVC based on advanced encryption standard (AES). …”
Get full text
Get full text
Get full text
Article -
12
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
Get full text
Get full text
Get full text
Thesis -
13
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
Get full text
Get full text
Thesis
