Search Results - normal distribution ((factor algorithm) OR (((encryption algorithm) OR (connection algorithm))))

Refine Results
  1. 1

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…In the other hand a new concealment method proposed by combine two of the popular methods DWT and DCT for embedding and extraction the secret data in order to compensate the drawbacks of both of them and to make the hidden information much more secure against the attacks, wavelet transform which use dyadic filters to decompose cover image into 4-levels (HH, HL, LH and LL) and discrete cosine Transforms to convert a signal of the selected coefficients (HH, HL and LH) into elementary frequency components then according to the percentages entering by a user the encrypted data will distribute. The efficiency of encryption and concealment have been checked out with a number of widely used metrics such as Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC).…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Profit-based optimal generation scheduling of a microgrid by Muhamad Razali N.M., Hashim A.H.

    Published 2023
    “…grid). Current methods normally assume either islanded operation, or utilitygrid connected ?…”
    Conference paper
  7. 7
  8. 8

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…One of the security challenges in Software Defined networking (SON) is Distributed denial of service (DDoS) attacks that overwhelm the controller and consume its resources making it unreachable effecting the connectivity throughout the entire network. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Furthermore, the isolation line is tested on different section and load factor to recognize the improvement of optimal distribution network performance. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Determining penetration limit of central distributed generation topology in radial distribution networks by Suliman, Mohamed Saad Abdelgadir

    Published 2021
    “…The biogeography based optimization method has been proven to have better performance than artificial bee colony, genetic algorithm, particle swarm optimization, hybrid of particle swarm optimization and constriction factor approach, and hybrid of ant colony optimization and artificial bee colony methods in terms of active power loss reduction. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…The performance of ECRP algorithms was compared with other cluster based algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Comparison Of Power Flow Based On Bus Admittance Matrix For Networked Microgrid Energy Management by Mohd Yassim, Halyani, Abdullah, Mohd Noor, Kim Gan, Chin

    Published 2024
    “…Several case studies demonstrated the feasibility of the networked microgrid in grid connected and islanded modes as well as the effectiveness of the Fast-Decoupled (BX version) method in facilitating power exchange between microgrids to maintain supply-demand balance under normal and abnormal conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method by Lawal, Sani Mohammed

    Published 2012
    “…To address these issues, this thesis focuses mainly on the optimal placement and sizing of DG in the distribution networks. Electrical distribution network systems normally include distribution feeders,which are arranged or configured either in mesh or radial pattern and they are mainly fed by a utility substation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…Due to these limitations, conventional mutual exclusion algorithms presented for distributed systems (DS) are not applicable for MANETs unless they attach to a mechanism for dynamic changes in their topology. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Peak pressure analysis of foot plantar distribution based on image processing algorithm by Sabry, Ali Hussein

    Published 2018
    “…The other main goal of this work is to create an algorithm which has the ability to formulate accurately and reliably the distribution of pressure over the foot plantar. …”
    Get full text
    Get full text
    Get full text
    Thesis