Search Results - different ((estimation algorithm) OR (((extraction algorithm) OR (encryption algorithm))))
Search alternatives:
-
1
A shift column different offset for better Rijndael security
Published 2009“…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
Get full text
Get full text
Get full text
Article -
2
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
3
Time Difference Of Arrival Estimation Using Fast Fourier Transform Overlap For Underwater Positioning
Published 2019“…An extraction of a signal from a receiver is performed by using digital signal processing algorithms. …”
Get full text
Get full text
Thesis -
4
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
5
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
6
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023“…Algorithms; Diodes; Extraction; Iterative methods; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Different evolutions; Differential Evolution; Diode modeling; Electromagnetism-like algorithm; Extracting parameter; Hybrid evolutionary algorithm; Photovoltaic model; Photovoltaic modules; Evolutionary algorithms…”
Conference Paper -
9
-
10
Individual-tree segmentation and extraction based on LiDAR point cloud data
Published 2024“…In the task of individual tree extraction, the point cloud distance discriminant clustering algorithm outperformed the watershed algorithm. …”
Get full text
Get full text
Get full text
Article -
11
-
12
The noise reduction algorithm for star detection
Published 2025“…To validate the algorithm, synthetic star images with different noise levels were tested. …”
Get full text
Get full text
Get full text
Article -
13
The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact
Published 2011“…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. …”
Get full text
Get full text
Article -
14
Surface Moisture Content Retrieval from Visible/Thermal Infrared Images and Field Measurements
Published 2013“…Moisture content parameters were calculated, and then the moisture content algorithm was generated accordingly for the two study locations with three different “Split-window” algorithms and finally a spatial validation of satellite θ algorithms was conducted for accuracy assessment. …”
Get full text
Get full text
Article -
15
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Then the results are compared to the average energy dissipation (μJ) by applying different encryption data, AES, SF and SIT algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Single-Trial Subspace-Based Approach for VEP Extraction
Published 2010“…With the simulated data, the algorithms are used to estimate the latencies of P100, P200, and P300 of VEP signals corrupted by additive colored noise at different values of SNR. …”
Get full text
Get full text
Get full text
Article -
17
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021“…In this study, UAV technology has been taking a look at several algorithms for estimating tree height value of a single tree crown. …”
Get full text
Get full text
Conference or Workshop Item -
18
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
19
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
20
Signal quality measures for unsupervised blood pressure measurement
Published 2012“…The mean systolic and diastolic differences were 0.37 ± 3.31 and 3.10 ± 5.46 mmHg, respectively, when the artifact detection algorithm was utilized, with the algorithm correctly determined if the signal was clean enough to attempt an estimation of systolic or diastolic pressures in 93% of blood pressure measurements.…”
Get full text
Get full text
Get full text
Article
