Search Results - normal distribution ((((factor algorithm) OR (encryption algorithm))) OR (selection algorithm))

Refine Results
  1. 1

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…The efficiency of encryption and concealment have been checked out with a number of widely used metrics such as Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC).…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
    Get full text
    Get full text
    Thesis
  6. 6

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
    Get full text
    Get full text
    Article
  7. 7

    Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method by Lawal, Sani Mohammed

    Published 2012
    “…The proposed PSO algorithm is used to determine optimal placement and size of DG in radial distribution networks, where Forward Backward Sweep Method (FBSM) of distribution load flow analysis was used, to determine the actual power loss in the system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Peak pressure analysis of foot plantar distribution based on image processing algorithm by Sabry, Ali Hussein

    Published 2018
    “…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
    Get full text
    Get full text
    Article
  10. 10

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M... by Mohamad Salehuddin, Mohamad Firdaus

    Published 2020
    “…For both cases, the statistical analysis data show that the p-value is more than 0.05, which indicates that the data are normally distributed. These measurement inputs were then going through the process of classification in ANN to generate the optimized models by using LM algorithm. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Termite mounds morphometry in predicting groundwater potentiality using geospatial technology by Bala, Ahmed Jamilu

    Published 2020
    “…Thereafter, twelve (12) groundwater conditioning factors (GCFs) (geology, drainage density, lineament density, lineament intersection density, land use/land cover, topographic wetness index (TWI), normalized difference vegetation index (NDVI), slope, elevation, plan curvature, static water level and groundwater level fluctuation) were passed through a feature selection filter (Correlation-based feature selection using the best first algorithm) to select the optimum groundwater control factors (GCFs) for groundwater prediction in the study area. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Monograph
  16. 16

    The comparison of tardiness in scheduling techniques for task distribution using grid simulation tool by Stapa @ Mustapa, Muhamad Azhar

    Published 2008
    “…The goal of this project is to test on tardiness parameter in local search based algorithms. A good scheduling algorithm normally shows lower value of total tardiness and schedule time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
    Get full text
    Get full text
    Monograph
  18. 18

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes an algorithm for increasing the stability of the cluster by selecting the most stable cluster head, maintaining the cluster structure with minimum maintenance overhead, and finding the best performance routing algorithm for use over MANET. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Identification of non-equilibrium growth for bitcoin exchange rate: mathematical derivation method in Islamic financial engineering by Rosbi, Sofian, Abu Bakar, Nashirah

    Published 2017
    “…Graphical method indicates the first difference of data distribution is a non-normal distribution. Then, Shapiro-Wilk statistical test confirmed that first difference of data distribution deviate from normal distribution. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20