Search Results - normal distribution ((factor algorithm) OR (((encryption algorithm) OR (connection algorithm))))
Search alternatives:
-
1
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
2
-
3
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…In the other hand a new concealment method proposed by combine two of the popular methods DWT and DCT for embedding and extraction the secret data in order to compensate the drawbacks of both of them and to make the hidden information much more secure against the attacks, wavelet transform which use dyadic filters to decompose cover image into 4-levels (HH, HL, LH and LL) and discrete cosine Transforms to convert a signal of the selected coefficients (HH, HL and LH) into elementary frequency components then according to the percentages entering by a user the encrypted data will distribute. The efficiency of encryption and concealment have been checked out with a number of widely used metrics such as Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC).…”
Get full text
Get full text
Get full text
Article -
4
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
5
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
6
Profit-based optimal generation scheduling of a microgrid
Published 2023“…grid). Current methods normally assume either islanded operation, or utilitygrid connected ?…”
Conference paper -
7
High Impedance Fault Detection on Power Distribution Feeder
Published 2012Get full text
Get full text
Get full text
Article -
8
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…One of the security challenges in Software Defined networking (SON) is Distributed denial of service (DDoS) attacks that overwhelm the controller and consume its resources making it unreachable effecting the connectivity throughout the entire network. …”
Get full text
Get full text
Thesis -
9
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
Get full text
Get full text
Monograph -
10
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…Furthermore, the isolation line is tested on different section and load factor to recognize the improvement of optimal distribution network performance. …”
Get full text
Get full text
Thesis -
11
Determining penetration limit of central distributed generation topology in radial distribution networks
Published 2021“…The biogeography based optimization method has been proven to have better performance than artificial bee colony, genetic algorithm, particle swarm optimization, hybrid of particle swarm optimization and constriction factor approach, and hybrid of ant colony optimization and artificial bee colony methods in terms of active power loss reduction. …”
Get full text
Get full text
Thesis -
12
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
A Study of Ikaz and Normalized Hilbert transform for solving faulty in pipeline distribution system using transmission line modelling
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A comparison of power flow based on bus admittance matrix for networked microgrid energy management
Published 2024“…Different power flow algorithms based on the bus admittance matrix are used in the MATLAB simulation. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…The performance of ECRP algorithms was compared with other cluster based algorithms. …”
Get full text
Get full text
Thesis -
17
A Comparison Of Power Flow Based On Bus Admittance Matrix For Networked Microgrid Energy Management
Published 2024“…Several case studies demonstrated the feasibility of the networked microgrid in grid connected and islanded modes as well as the effectiveness of the Fast-Decoupled (BX version) method in facilitating power exchange between microgrids to maintain supply-demand balance under normal and abnormal conditions. …”
Get full text
Get full text
Get full text
Article -
18
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…To address these issues, this thesis focuses mainly on the optimal placement and sizing of DG in the distribution networks. Electrical distribution network systems normally include distribution feeders,which are arranged or configured either in mesh or radial pattern and they are mainly fed by a utility substation. …”
Get full text
Get full text
Thesis -
19
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Due to these limitations, conventional mutual exclusion algorithms presented for distributed systems (DS) are not applicable for MANETs unless they attach to a mechanism for dynamic changes in their topology. …”
Get full text
Get full text
Thesis -
20
Peak pressure analysis of foot plantar distribution based on image processing algorithm
Published 2018“…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
Get full text
Get full text
Get full text
Thesis
