Search Results - ((((recognition algorithm) OR (encryption algorithm))) OR (evolution algorithm))
Search alternatives:
- evolution algorithm »
-
1
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
2
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
3
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
Get full text
Get full text
Get full text
Article -
4
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
Get full text
Get full text
Article -
5
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…In the experiment, we conducted an evaluation of the effectiveness and efficiency of four nature-inspired binary algorithms for optimization namely Binary Particle Swarm Optimization (BPSO), Binary Grey Wolf Optimization algorithm (BGWO), Binary Differential Evolution algorithm (BDE), and Binary Salp Swarm algorithm (BSS) - in the context of human activity recognition (HAR). …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…The methodology proposed is based on algorithms tested for feature extraction of plate and face recognition based on unconstrained minimum average correlation energy (UMACE) filter. …”
Get full text
Get full text
Thesis -
7
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…This paper looks at the feasibility of using the differential evolution algorithm to estimate the linear frequency modulation received signal parameters for radar signal denoising. …”
Get full text
Get full text
Conference or Workshop Item -
9
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
10
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Euclidean Distance, Pearson Correlation and Matching Matrix were used to measure the performance of the feature extraction and clustering methods. Recognition software achieved 87.14%, EPD algorithm achieved 73.57% and HMT algorithm achieved 74.30%) prediction accuracy with OTs. …”
Get full text
Get full text
Thesis -
11
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
12
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024Subjects:journal::journal article -
13
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
14
Cryptanalysis using biological inspired computing approaches
Published 2006“…Some examples of BIC approaches are genetic algorithm (GA), ant colony and artificial immune system (AIS). …”
Get full text
Get full text
Conference or Workshop Item -
15
Intelligent presentation slide control video (INSTRUCT) / Mohd Razif Shamsuddin, Nurzeatul Hamimah Abd Hamid and Muhammad Syafiq Jasmin
Published 2012“…However there is a next step of evolution that started to gain interest lately which is hand gesture recognition. …”
Get full text
Get full text
Book Section -
16
Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images
Published 2022“…The findings revealed that the algorithm outperformed the other active contour-based approaches in computational time and segmentation accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
18
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
Get full text
Get full text
Get full text
Thesis -
19
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…AES algorithm shows the highest encrypted data size which is with above 234214 bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph
