Search Results - adoption a different ((estimation algorithm) OR (encryption algorithm))
Search alternatives:
- estimation algorithm »
- a different »
- adoption a »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
3
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
4
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
5
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
6
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A Computationally Efficient Least Square Channel Estimation Method for MIMO-OFDM Systems
Published 2021“…The 5th generation of cellular system is expected to incur a huge traffic rise which would necessitate the adoption of an estimation method that is efficient but at the same time practical through easy implementation. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
Get full text
Get full text
Thesis -
9
Finite impulse response optimizers for solving optimization problems
Published 2019“…The first algorithm is a single-agent-based algorithm, named Single-agent FIR optimizer (SAFIRO). …”
Get full text
Get full text
Thesis -
10
Finite impulse response optimizers for solving optimization problems
Published 2019“…The first algorithm is a single-agent-based algorithm, named Single-agent FIR optimizer (SAFIRO). …”
Get full text
Get full text
Thesis -
11
Distribution network fault section estimation using analytical database approach
Published 2004“…This thesis describes the development or a new fault section estimation algorithm in a distribution network. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…The estimated CVDs path model can be implemented as a disease delay strategy in clinical settings. …”
Get full text
Get full text
Thesis -
14
Apply and optimize machine learning algorithms for estimating battery health
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264
Published 2009“…The proposed hardware accelerator can be used in different disciplines from low bit rate to high bit rate by making a tradeoff between the degree of parallelism or using fast algorithm or a combination of both.…”
Get full text
Get full text
Conference or Workshop Item -
17
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…The Normalized Mean Square Error (NMSE) and the BER perfor�mances for different DVB-S2X system MODCODs are investigated and the results for these algorithms are compared with the conventional Minimum Mean Square Er�ror (MMSE) and Least Square (LS) channel estimation techniques. …”
Get full text
Get full text
Thesis -
18
Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction
Published 2024“…As matrix depth measures how central or deep a particular matrix is within a distribution with respect to different directions, it is an efficient tool for computing a robust scatter matrix estimator that can handle outliers and complex data structures. …”
Get full text
Get full text
Get full text
Article -
19
Fuzzy Type-1 Triangular Membership Function Approximation Using Fuzzy C-Means
Published 2020“…Using a set of equations, these values then estimate the parameters of the triangular membership function. …”
Get full text
Get full text
Conference or Workshop Item -
20
Determining the order of a moving average model of time series using reversible jump MCMC: a comparison between laplacian and gaussian noises
Published 2020“…Therefore, to overcome this problem, the Markov Chain Monte Carlo (MCMC) reversible jump algorithm is adopted. A simulation study was conducted to evaluate its performance. …”
Get full text
Get full text
Get full text
Article
