Search Results - ((((recognition algorithm) OR (encryption algorithm))) OR (extraction algorithm))

Refine Results
  1. 1

    Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor by Md Noor, Siti Salwa

    Published 2013
    “…The methodology proposed is based on algorithms tested for feature extraction of plate and face recognition based on unconstrained minimum average correlation energy (UMACE) filter. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
    Get full text
    Get full text
    Thesis
  6. 6

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    On the Computational Cost of Cocks’ Identity Based Encryption by Moo, Gabriel Ka Lin, Arif Mandangan, Rozaimi Zakaria

    Published 2018
    “…Unfortunately, lack of efficiency becomes a major drawback of the Cocks’ Identity Based Encryption. The algorithms in Cocks’ Identity Based Encryption consists of four stages: Setup, Extract, Encrypt and Decrypt. …”
    Get full text
    Get full text
    Article
  8. 8

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The finding in this project is the k-NN algorithm is good feature extraction and classifier. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Jamaludin, Sallim, Kohbalan, Moorthy

    Published 2021
    “…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Feature extraction using active appearance model algorithm with Bayesian classification approach by Nuruzzaman, Mohammad, Hussain, Azham, Mohamad Tahir, Hatim, Abu Seman, Mohamad Amir

    Published 2013
    “…It directed towards the illumination-invariant automatic recognition of faces and analysis to improve face verification and identification performance.To compare with other feature extraction at the end of the study, an evaluation has been done with an existing face recognition system using AAM algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Static hand gesture recognition using artificial neural network / Haitham Sabah Hasan by Hasan, Haitham Sabah

    Published 2014
    “…Artificial neural network is built for the purpose of classification by using the back- propagation learning algorithm. The proposed system presents a recognition algorithm to recognize a set of six specific static hand gestures, namely: Open, Close, Cut, Paste, Maximize, and Minimize. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Facial expression type recognition using K-Nearest Neighbor algorithm / Norhafizah Saffian by Saffian, Norhafizah

    Published 2017
    “…Based on this calculation, the accuracy of this algorithm is 93% using the k values of 5. The future work that continue based on this project proposed is by study and applied other type of algorithm that can produce the high performance and accuracy of classification of facial feature for facial expression recognition.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM) by Iqtait, M., Mohamad, F.S., Mamat, M.

    Published 2018
    “…Precise and strong location of trait point is a complicated and difficult issue in face recognition. Cootes proposed a Multi Resolution Active Shape Models (ASM) algorithm, which could extract specified shape accurately and efficiently. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…Moreover, the ant colony optimisation technique be applied as an expert algorithm to make a decision for the selection of optimal features in order to enhance the performance of a classifier for recognition of diverse species of plants. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    Hevea leaf features extraction and recognition algorithm for hevea clones classification using image / Mohamad Faizal Ab Jabal, Suhardi Hamid, Salehuddin Shuib by Ab Jabal, Mohamad Faizal, Hamid, Suhardi, Shuib, Salehuddin

    Published 2013
    “…As a result Wu et al. [1] was successful developed an efficient algorithm for the plant classification. 32 kinds of plants have been classified by using the algorithm. …”
    Get full text
    Get full text
    Research Reports
  20. 20

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis