Search Results - property distribution ((((function algorithm) OR (encryption algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive digital watermarking system for authentication of intellectual properties by Olanweraju, Rashidah Funke, Abd Manaf, Azizah, Zeki, Akram M.

    Published 2011
    “…Such opportunities and improvements pose a great concern to all multimedia industries, especially intellectual properties. The fact is that the current digital distribution and storage technologies are great threat of counterfeiting and piracy where unlimited number of perfect copies can be produce illegally. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3
  4. 4

    An improved bat algorithm with artificial neural networks for classification problems by Rehman Gillani, Syed Muhammad Zubair

    Published 2016
    “…The proposed BAGD, SABa, and GBa are tested on several benchmark functions and improvements in convergence to global optima were detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Flexible content authorization using digital rights management in cloud computing / Ali Hussain by Ali , Hussain

    Published 2021
    “…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
    Get full text
    Get full text
    Article
  8. 8

    A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) by Khan, M.A., Ali, A., Jeoti, V., Manzoor, S.

    Published 2018
    “…Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. …”
    Get full text
    Get full text
    Article
  9. 9

    The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios by Arun Rana, Sharad Sharma, Kashif Nisar, Ag. Asri Ag. Ibrahim, Sachin Dhawan, Bhawani Chowdhry, Samreen Hussain, Nitin Goyal

    Published 2022
    “…One of the most well-known and extensively utilized distributed ledger systems is the blockchain. Due to its unique properties, such as privacy, accountability, immutability, and anonymity, blockchain technology has recently attracted a lot of interest. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A new Gompertz-three-parameter-lindley distribution for modeling survival time data by Liang, Fei, Lu, Hezhi, Xi, Yuhang

    Published 2025
    “…The statistical properties of the proposed distribution including the shape properties, cumulative distribution, quantile functions, moment generating function, failure rate function, mean residual function, and stochastic orders are studied. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Parameter-driven count time series models / Nawwal Ahmad Bukhari by Nawwal , Ahmad Bukhari

    Published 2018
    “…The first part of the study derives the explicit solutions of the moment properties (mean, variance, skewness and kurtosis) of the distributions together with their respective autocovariance and autocorrelation functions, up to the ith order. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A lightweight graph-based pattern recognition scheme in mobile ad hoc networks. by Raja Mahmood, Raja Azlina, Muhamad Amin, Anang Hudaya, Amir, Amiza, Khan, Asad I.

    Published 2012
    “…A lightweight, low-computation, distributed intrusion detection scheme termed the distributed hierarchical graph neuron (DHGN) was proposed to be incorporated into a cooperative intrusion detection system (IDS) in mobile ad hoc networks (MANETs). …”
    Get full text
    Book Section
  13. 13

    Remotely sensed imagery data application in mangrove forest: a review by Abdul Whab @ Abdul Wahab, Zulfa, Kamarudin, Norizah

    Published 2018
    “…All types of measurements related to the mangrove forest ecosystem, such as detection of land cover changes, species distribution mapping and disaster observation should take advantage of the advanced technology; for example, adopting the digital image processing algorithm coupled with high-resolution image available nowadays. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    On a new transmuted three-parameter lindley distribution and its applications by Xi, Yuhang, Lu, Hezhi, Liang, Fei

    Published 2024
    “…The statistical properties of the TTHPLD model, which are based on moments, order statistics, hazard rate functions, reliability functions, and Renyi entropy, have been studied. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…Also, a one-step iterative algorithm, called expected rank algorithm, is introduced which is more complicated than the estimation-approximation algorithm, but more accurate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    White root disease auto-detection system for rubber trees based on dynamic electro-biochemical latex properties / Mohd Suhaimi Sulaiman by Sulaiman, Mohd Suhaimi

    Published 2019
    “…In general, there were four objectives involves in this research which are using available measurement technique to obtain information on latex properties, statistical analysis as a way of showing that the information obtained are normally distributed and can be discriminated, artificial intelligent as for generating classification models and lastly using GUI for the development of the Auto-Detection System. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Some families of count distributions for modelling zero-inflation and dispersion / Low Yeh Ching by Low, Yeh Ching

    Published 2016
    “…Some of the theoretical properties of the distributions are derived and the distributions' characteristics are studied. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Ab-initio calculations of the structural, electronic and optical properties of (CdSe)2 clusters by Alselawe, A.I.A., Jumali, MHH, Gopir, G., M.M. Anas

    Published 2020
    “…The goal of this study was to determine the various stable geometric structure isomers of (CdSe)2 clusters; also, structural, electronic, and optical properties of the stable isomers are investigated using density functional theory (DFT). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Feasibility of QKD over FSO Link by Husagić-Selman, Alma, Al-Khateeb, Wajdi Fawzi Mohammed, Saharudin, Shuhairi

    Published 2012
    “…Due to the advancements in the field of quantum computing and possible compromise of existing key-exchange algorithms, it is essential to explore performance and efficiency of new key-exchange techniques, such as Quantum Key Distribution (QKD). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Evoluation strategy for collaborative beamforming in wireless sensor networks by Wong, Chen How

    Published 2013
    “…This group of distributed wireless sensor nodes intrinsically act as a set of virtual antenna array and inherit the natural highly directional transmission properties from conventional antenna array. …”
    Get full text
    Get full text
    Get full text
    Thesis