بدائل البحث:
code encryption » secure encryption (توسيع البحث)
يعرض 1 - 14 نتائج من 14 نتيجة بحث عن '(( damage detection algorithm ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Based on the numerous experiments, an optimum distance of inspection is estimated which yields damage detection and localization with high accuracy thereby solving all the aforementioned issues. …"
    احصل على النص الكامل
  2. 2

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
    احصل على النص الكامل
    article
  3. 3

    Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents حسب Muhammad E. H. Chowdhury (14150526)

    منشور في 2019
    "…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …"
  4. 4

    Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix حسب Haraty, Ramzi Ahmed

    منشور في 2017
    "…This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5

    An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems حسب Boukhari, Bahia

    منشور في 2019
    "…Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  6. 6

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine حسب Debendra Muduli (20748758)

    منشور في 2024
    "…In this MOD-POA+ELM algorithm, the modified pelican optimization algorithm (MOD-POA) has been utilized to optimize the parameters of ELM’s hidden neurons. …"
  7. 7
  8. 8

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct state before the attack has taken place. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 9

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct previous state before the attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 10
  11. 11

    Information reconciliation through agent controlled graph model. (c2018) حسب Saba, Rita

    منشور في 2018
    "…Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  12. 12

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights حسب Malekloo, Arman

    منشور في 2021
    "…Conventional damage detection techniques are gradually being replaced by state-of-the-art smart monitoring and decision-making solutions. …"
    احصل على النص الكامل
    article
  13. 13

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …"
  14. 14