Search Results - normal distribution ((((function algorithm) OR (encryption algorithm))) OR (selection algorithm))

Refine Results
  1. 1

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…The efficiency of encryption and concealment have been checked out with a number of widely used metrics such as Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC).…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function by Hanafi, M. Yusop, M. F., Ghazali, M. F. M., Yusof, M. A., Pi Remli

    Published 2018
    “…This paper proposed to apply Integrated Kurtosis-based Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of intrinsic mode function (IMF) that’s should be used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…Previous researchers normally select the IMF visually, based on the user’s experience, and introduced a merit index that allows the automatic selection of the IMF. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Performance Improvement of Multiobjective Optimal Power Flow-Based Renewable Energy Sources Using Intelligent Algorithm by Huy, T.H.B., Nguyen, T.P., Mohd Nor, N., Elamvazuthi, I., Ibrahim, T., Vo, D.N.

    Published 2022
    “…Weibull and lognormal probability distribution functions (PDFs) are respectively adopted to describe uncertainties in wind speed and solar irradiance. …”
    Get full text
    Get full text
    Article
  11. 11

    Peak pressure analysis of foot plantar distribution based on image processing algorithm by Sabry, Ali Hussein

    Published 2018
    “…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
    Get full text
    Get full text
    Article
  13. 13

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The NPO successfully solved 52 out of 60 (86.6%) normal sized test functions while 16 out of 18 (88.8%) large-scale problems were equally solved. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method by Lawal, Sani Mohammed

    Published 2012
    “…The proposed PSO algorithm is used to determine optimal placement and size of DG in radial distribution networks, where Forward Backward Sweep Method (FBSM) of distribution load flow analysis was used, to determine the actual power loss in the system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques by Googhari, Shahram Karimi

    Published 2007
    “…The models were trained with normalized and non-normalized data. The selected ANFIS model was trained with normalized data with 6 Gaussian membership functions for each of 9 inputs and 6 rules. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets by Saeed, Sana

    Published 2019
    “…For this purpose, the normal distributions are applied to each class. The parameters of this distribution are optimized by applying the proposed MOHA. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M... by Mohamad Salehuddin, Mohamad Firdaus

    Published 2020
    “…For both cases, the statistical analysis data show that the p-value is more than 0.05, which indicates that the data are normally distributed. These measurement inputs were then going through the process of classification in ANN to generate the optimized models by using LM algorithm. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…The focus of this analysis is on original observations that performed a detecting outlier and power transformation to transform not normally distributed data to near normality. The correlation of each system calls are examined using coefficient correlations of each selected system call variables. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. …”
    Get full text
    Get full text
    Thesis