Search Results - (( using complex data algorithm ) OR ( software certification method algorithm ))
Search alternatives:
- certification method »
- method algorithm »
- data algorithm »
- using complex »
-
1
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
2
Damageless Digital Watermarking Using Complex-valued Artificial Neural Network
Published 2010“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Damageless digital watermarking using complex-valued artificial neural network
Published 2010“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
5
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
Published 2015“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Monograph -
6
Comparison study of sorting techniques in dynamic data structure
Published 2016“…The fastest algorithm is then determined by the estimated value for each sorting algorithm, which is computed using linear least square regression. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Comparison study of sorting techniques in dynamic data structure
Published 2016“…The fastest algorithm is then determined by the estimated value for each sorting algorithm, which is computed using linear least square regression. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Optimize the maximum flow of electricity capacity using Ford Fulkerson, Edmonds Karp and Goldberg Tarjan algorithm / Nik Nur Diyana Nik Mohd Huzaidi
Published 2024“…This research explores the optimization of electricity flow using the Ford Fulkerson, Edmonds Karp, and Goldberg Tarjan algorithms. …”
Get full text
Get full text
Thesis -
9
Performance Analysis of ARMA based Magnetic Resonance Imaging (MRI) Reconstruction Algorithm
Published 2012“…The proposed model coefficients determination in conjunction with various methods of optimal model order determination were then applied on MRI data using both Transient Error Reconstruction Algorithm (TERA) and modified Transient Error Reconstruction Algorithm to obtain images with improved resolution. …”
Get full text
Get full text
Monograph -
10
-
11
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
12
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…To investigate and capture the development of the pandemic, mapper algorithm can be used to visualize and analyse the COVID data set provided by the government. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Distortion-free embedding in the optic disk of retina fundus images using complex-valued neural network
Published 2011“…The novelty of the proposed algorithm is that it guarantees a complete recovery of the embedded data during watermark extraction provided the network is trained properly and correct weights are used. …”
Get full text
Get full text
Get full text
Article -
14
WCBP: A new water cycle based back propagation algorithm for data classification
Published 2016“…The back-propagation neural network (BPNN) algorithm performs well on many complex data types but it possess the problem of network stagnancy and local minima. …”
Get full text
Get full text
Article -
15
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
16
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…Adopting the medoid instead of the mean can enhance the efficiency. However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
17
-
18
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
19
Performance Measurement on Deep Spiking Neural Network (DSNN) Algorithm in Flood Prediction Environment
Published 2023“…There are several algorithms used to predict floods, including LSTM, BP, MLP, SARIMA, and SVM. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…The proposed algorithm showed that it can reduce the computational complexity and run time compared to baseline algorithms. …”
Get full text
Get full text
Get full text
Thesis
