Search Results - property distribution ((((function algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
- property distribution »
- function algorithm »
-
1
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
Get full text
Get full text
Thesis -
2
Adaptive digital watermarking system for authentication of intellectual properties
Published 2011“…Such opportunities and improvements pose a great concern to all multimedia industries, especially intellectual properties. The fact is that the current digital distribution and storage technologies are great threat of counterfeiting and piracy where unlimited number of perfect copies can be produce illegally. …”
Get full text
Get full text
Get full text
Book Chapter -
3
A New Cryptosystem Based on Decimal Numbers and Nonlinear Function
Published 2009Get full text
Get full text
Thesis -
4
An improved bat algorithm with artificial neural networks for classification problems
Published 2016“…The proposed BAGD, SABa, and GBa are tested on several benchmark functions and improvements in convergence to global optima were detected. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
6
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
7
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
Get full text
Get full text
Article -
8
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
Get full text
Get full text
Article -
9
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…One of the most well-known and extensively utilized distributed ledger systems is the blockchain. Due to its unique properties, such as privacy, accountability, immutability, and anonymity, blockchain technology has recently attracted a lot of interest. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
A new Gompertz-three-parameter-lindley distribution for modeling survival time data
Published 2025“…The statistical properties of the proposed distribution including the shape properties, cumulative distribution, quantile functions, moment generating function, failure rate function, mean residual function, and stochastic orders are studied. …”
Get full text
Get full text
Get full text
Article -
11
Parameter-driven count time series models / Nawwal Ahmad Bukhari
Published 2018“…The first part of the study derives the explicit solutions of the moment properties (mean, variance, skewness and kurtosis) of the distributions together with their respective autocovariance and autocorrelation functions, up to the ith order. …”
Get full text
Get full text
Get full text
Thesis -
12
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…A lightweight, low-computation, distributed intrusion detection scheme termed the distributed hierarchical graph neuron (DHGN) was proposed to be incorporated into a cooperative intrusion detection system (IDS) in mobile ad hoc networks (MANETs). …”
Get full text
Book Section -
13
Remotely sensed imagery data application in mangrove forest: a review
Published 2018“…All types of measurements related to the mangrove forest ecosystem, such as detection of land cover changes, species distribution mapping and disaster observation should take advantage of the advanced technology; for example, adopting the digital image processing algorithm coupled with high-resolution image available nowadays. …”
Get full text
Get full text
Get full text
Article -
14
On a new transmuted three-parameter lindley distribution and its applications
Published 2024“…The statistical properties of the TTHPLD model, which are based on moments, order statistics, hazard rate functions, reliability functions, and Renyi entropy, have been studied. …”
Get full text
Get full text
Get full text
Article -
15
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…Also, a one-step iterative algorithm, called expected rank algorithm, is introduced which is more complicated than the estimation-approximation algorithm, but more accurate. …”
Get full text
Get full text
Get full text
Thesis -
16
White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman
Published 2019“…In general, there were four objectives involves in this research which are using available measurement technique to obtain information on latex properties, statistical analysis as a way of showing that the information obtained are normally distributed and can be discriminated, artificial intelligent as for generating classification models and lastly using GUI for the development of the Auto-Detection System. …”
Get full text
Get full text
Thesis -
17
Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching
Published 2016“…Some of the theoretical properties of the distributions are derived and the distributions' characteristics are studied. …”
Get full text
Get full text
Thesis -
18
Ab-initio calculations of the structural, electronic and optical properties of (CdSe)2 clusters
Published 2020“…The goal of this study was to determine the various stable geometric structure isomers of (CdSe)2 clusters; also, structural, electronic, and optical properties of the stable isomers are investigated using density functional theory (DFT). …”
Get full text
Get full text
Get full text
Article -
19
Feasibility of QKD over FSO Link
Published 2012“…Due to the advancements in the field of quantum computing and possible compromise of existing key-exchange algorithms, it is essential to explore performance and efficiency of new key-exchange techniques, such as Quantum Key Distribution (QKD). …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Evoluation strategy for collaborative beamforming in wireless sensor networks
Published 2013“…This group of distributed wireless sensor nodes intrinsically act as a set of virtual antenna array and inherit the natural highly directional transmission properties from conventional antenna array. …”
Get full text
Get full text
Get full text
Thesis
