Search Results - (( probable distribution function algorithm ) OR ( java applications security algorithm ))
Search alternatives:
- probable distribution »
- function algorithm »
- java applications »
-
1
An empirical study of density and distribution functions for ant swarm optimized rough reducts
Published 2011“…To describe relative probability of different random variables, Probability Density Function (PDF) and the Cumulative Density Function (CDF) are capable to specify its own characterization of Gaussian distributions. …”
Get full text
Get full text
Get full text
Book Chapter -
2
-
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
4
A Comparative Performance Analysis of Gaussian Distribution Functions in Ant Swarm Optimized Rough Reducts
Published 2011“…Coexistence, cooperation, and individual contribution to food searching by a particle (ant) as a swarm (ant) survival behavior, depict the common characteristics of both algorithms. Solution vector of ACO is presented by implementing density and distribution function to search for a better solution and to specify a probability functions for every particle (ant). …”
Get full text
Get full text
Article -
5
Novel distributed algorithm for coalition formation for enhanced spectrum sensing in cognitive radio networks
Published 2017“…The utility function is defined as the average probability of false alarm per cognitive radio user. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
7
Novel distributed algorithm for coalition formation in cognitive radio networks for throughput enhancement using matching theory
Published 2017“…The utility function is defined as the average probability of false alarm per cognitive radio user. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching
Published 2016“…The probability function of the counts is often complicated thus a method using numerical Laplace transform inversion for computing the probabilities and the renewal function is proposed. …”
Get full text
Get full text
Thesis -
10
Cash-flow analysis of a wind turbine operator
Published 2023“…Two-parameter Weibull type probability density function (PDF) is used to model wind profile at two locations. …”
Conference Paper -
11
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…Thereafter, a multi-objective hybrid algorithm (MOHA), an extension of the self-adaptive hybrid algorithm is proposed and tested on the established multi-objective (MO) test functions. …”
Get full text
Get full text
Thesis -
12
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
15
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
16
Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat
Published 2020“…Determination of the best factor is carried out in a genetic algorithm by combining several parameters of the crossover probability (Pc) and mutation probability (Pm). …”
Get full text
Get full text
Get full text
Article -
17
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
18
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
19
Secure scheme for user authentication and authorization in android environment
Published 2013“…Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. …”
Get full text
Get full text
Get full text
Article -
20
Sizing and Placement of Battery-Sourced Solar Photovoltaic (B-SSPV) Plants in Distribution Networks
Published 2021“…To deal the stochastic behavior of solar irradiance, 15 years of weather data is modeled by using beta probability density function (Beta-PDF). The proposed algorithm is applied on IEEE 33 bus and IEEE 69 bus test distribution networks and optimum results are acquired for different time varying voltage dependent load models. …”
Get full text
Get full text
Book
