Search Results - (( using factor scheme algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- scheme algorithm »
- java application »
- using factor »
-
1
An adaptive scaling factor for multiple watermarking scheme
Published 2019“…This experiment examines DCT coefficients in the middle frequency to obtain adaptive scaling factor for embedding a watermark. The proposed algorithm used the impact of selected DCT coefficients to imperceptibility and robustness for generating t adaptive scaling factor. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
3
Multigrid solution of Euler equations using high-resolution NVD differencing scheme for unstructured meshes
Published 2023“…The efficiencies of the GAMMA scheme and its variant have been augmented with a novel agglomeration multigrid scheme to accelerate the convergence to steady state using the multi-stage Runge-Kutta time-marching technique. …”
Article -
4
A new multi-frames watermarking technique for tamper detection and recovery
Published 2017“…The higher speed up factor in TALLOR indicated that the performance of the proposed multi-frames watermarking scheme is affected by the algorithm complexity of the adopted watermarking scheme and the number of frames in medical images processed.…”
Get full text
Get full text
Thesis -
5
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…Likewise, the widely used standard verification simulation tool AVISPA is used to verify that the scheme is secure against passive and active attacks. …”
Get full text
Get full text
Thesis -
6
New methods of partial transmit sequence for reducing the high peak-to-average-power ratio with low complexity in the ofdm and f-ofdm systems
Published 2019“…Secondly, two novel algorithms, Grouping Complex iterations algorithm (G-C-PTS), and Gray Code Phase Factor algorithm (Gray-PF-PTS) have been developed to reduce the computational complexity for finding the optimum phase rotation factors in the time domain part of the PTS structure. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…Finally, the performance of V-BLAST/STBC transceiver scheme with proposed LC-QR algorithm is compared with other MIMO systems, such as V-BLAST and orthogonal space-time block codes. …”
Get full text
Get full text
Thesis -
8
QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics
Published 2016“…The implementation stage is taken two different simulators has been used, the first one which is the optical simulator is used to collect the initial optical data then, MATLAB is used to develop the equalisation scheme. …”
Get full text
Get full text
Get full text
Thesis -
9
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…We introduce two concepts of splitting messages using the scheme in El-Gamal and Massey-Omura algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…We proved our scheme using Burrows Abdi Needham’s logic (BAN logic) to prove secure mutual authentication. …”
Get full text
Get full text
Article -
12
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis -
13
Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks
Published 2008“…The second proposed scheme is a bandwidth reservation scheme based on Mobility Prediction Scheme (MPS). …”
Get full text
Get full text
Thesis -
14
Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks
Published 2012“…The simulation results highlighted that the proposed algorithms (MR-CSA and MR-DSA) outperform all previous algorithms with the current signaling scheme. …”
Get full text
Get full text
Thesis -
15
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…Chain code scheme is one of the Picture Description Languages used to represent lines. …”
Get full text
Get full text
Get full text
Article -
16
Active authentication by one time password based on unique factor and behavioral biometric
Published 2013“…However, existing OTP schemes suffer from several drawbacks. Moreover, OTP schemes are vulnerable either because of a weakness in hardware devices (e.g., token devices that apply OTP schemes) or because of the use of weak algorithms or methods to generate OTP. …”
Get full text
Get full text
Get full text
Article -
17
Adaptive-model based self-tuning generalized predictive control of a biodiesel reactor / Ho Yong Kuen
Published 2011“…Traditionally, the Recursive Least Squares (RLS) algorithm was used in the Generalized Predictive Control (GPC) framework solely for model adaptation purposes. …”
Get full text
Get full text
Thesis -
18
Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks
Published 2014“…A dynamic user-wise algorithm is proposed to resolve this problem. In depth comparison among these schemes using different metrics like average sum-rate per cell, data rate and feedback rate demonstrates the better performance of centralized cooperation over partial cooperation with higher backhaul load. …”
Get full text
Get full text
Thesis -
19
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
20
A novel scheme for performing wireless distributed computing with strip spectral correlation algorithm
Published 2013Get full text
Get full text
Proceeding Paper
