Search Results - (( java adaptation optimization algorithm ) OR ( data protection process algorithm ))
Search alternatives:
- adaptation optimization »
- protection process »
- process algorithm »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Discovering decision algorithm from a distance relay event report
Published 2009“…In helping the protection engineers deal with this overwhelming data, this study relied merely on digital protective relay’s recorded event report because, among other intelligent electronic devices, digital protective relay sufficiently provided virtually most attributes needed for data mining process in knowledge discovery in database. …”
Get full text
Get full text
Get full text
Article -
3
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
4
-
5
-
6
Protection of the texts using Base64 and MD5
Published 2012“…The main objective of the use of encryption algorithms is to protect data and information in order to achieve privacy. …”
Get full text
Get full text
Get full text
Article -
7
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
Get full text
Get full text
Thesis -
8
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Whether the key is not so strong or the time needed for processing is slow. In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
9
State-of-the-art in techniques of text digital watermarking: challenges and limitations
Published 2016“…Data protection from malicious attacks and misuse has become a crucial issue. …”
Get full text
Get full text
Get full text
Article -
10
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Therefore, there is a need to protect the fingerprint template, especially in unsecured networks to maintain data privacy and confidentiality. …”
Get full text
Get full text
Get full text
Article -
11
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
12
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
13
User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop
Published 2017“…However, the smartphone also is a personal device which means it contains a lot of confidential data. Therefore it needs some kind of protection to avoid unauthorized access to the data inside. …”
Get full text
Get full text
Student Project -
14
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…The experimental results showed that the proposed cloaking algorithm outperformed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
Get full text
Get full text
Get full text
Article -
17
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…The experimental results showed that the proposed cloaking algorithm out performed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
Get full text
Get full text
Article -
18
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
19
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…Cryptography is one of the most important technology for protecting digital data. As there is need for secure communication, efficient and secure cryptographic processing is needed for desirable platform overall performance. …”
Get full text
Get full text
Get full text
Article -
20
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article
