Search Results - normal distribution ((function algorithm) OR (((encryption algorithm) OR (control algorithm))))
Search alternatives:
-
1
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
2
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi
Published 2016“…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
Get full text
Get full text
Article -
3
Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi
Published 2016“…Bandwidth Control Algorithms is developed based on Peak Time of day and night. …”
Get full text
Get full text
Thesis -
4
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis -
5
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
6
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Article -
7
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Empirical cumulative distribution function (CDF) model is presented in evaluating the real traffic distribution. …”
Get full text
Get full text
Thesis -
8
PSO modelling and PID controlled of automatic fish feeder system
Published 2020“…The main objective of this study is to improve the performance of fish feeding system by using PID controller through ARX modelling. In this study, raw data at distribution part with speed of 130 rpm, 160 rpm, 190 rpm, 220 rpm and 250 rpm were extracted and used to determine ARX equation parameters as transfer function by using PSO algorithm to optimize ARX model parameter. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Optimisation of distributed generation in electric power systems using fuzzy-genetic algorithm approach
Published 2011“…This model takes into account, the peculiarities of radial distribution networks, such as high R/X (resistance/reactance) ratio, voltage dependency and composite nature of loads.To solve the proposed models, Genetic algorithm (GA) is used as an optimisation technique. …”
Get full text
Get full text
Thesis -
10
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The NPO successfully solved 52 out of 60 (86.6%) normal sized test functions while 16 out of 18 (88.8%) large-scale problems were equally solved. …”
Get full text
Get full text
Thesis -
11
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…One of the models considers a Normal distribution function for demand, and another one, a Uniform distribution function. …”
Get full text
Get full text
Thesis -
12
Streamflow prediction with large climate indices using several hybrid multilayer perceptrons and copula Bayesian model averaging
Published 2023“…Climate models; Flood control; Floods; Forecasting; Information management; Inverse problems; Mean square error; Multilayer neural networks; Multilayers; Normal distribution; Particle swarm optimization (PSO); Reservoir management; Reservoirs (water); Risk management; Rivers; Stream flow; Uncertainty analysis; Bat algorithms; Bayesian model averaging; Bayesian modelling; Copula bayesian model; Gamma test; Inclusive multiple model; Multilayers perceptrons; Multiple-modeling; Natural hazard; Optimization algorithms; Bayesian networks; flood; flood control; North Atlantic Oscillation; perception; reservoir; streamflow; uncertainty analysis; Kelantan; Malaysia; West Malaysia…”
Article -
13
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…In the other hand a new concealment method proposed by combine two of the popular methods DWT and DCT for embedding and extraction the secret data in order to compensate the drawbacks of both of them and to make the hidden information much more secure against the attacks, wavelet transform which use dyadic filters to decompose cover image into 4-levels (HH, HL, LH and LL) and discrete cosine Transforms to convert a signal of the selected coefficients (HH, HL and LH) into elementary frequency components then according to the percentages entering by a user the encrypted data will distribute. The efficiency of encryption and concealment have been checked out with a number of widely used metrics such as Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NCC).…”
Get full text
Get full text
Get full text
Article -
14
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
15
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
16
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
Published 2024“…In the second stage, a new approach called Adaptive Multilevel Thresholding Segmentation (AMTS) is proposed for unsupervised brain tumor xxi subregion segmentation from normal brain tissue. The AMTS approach segments and extracts the whole tumor, core tumor, and enhanced tumor regions from the brain MR images, integrating the Multi-Objective Grasshopper Optimization algorithm, Kapur Entropy, Cross-Entropy, and Localized active contour.…”
Get full text
Get full text
Thesis -
17
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
18
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…For this purpose, the normal distributions are applied to each class. The parameters of this distribution are optimized by applying the proposed MOHA. …”
Get full text
Get full text
Thesis -
19
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fitted the best 2-parameter CDF compared to WeibuII, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
20
