Search Results - (( code application ((among algorithm) OR (amh algorithm)) ) OR ( _ evaluation model algorithm ))*
Search alternatives:
- code application »
- among algorithm »
- model algorithm »
- amh algorithm »
-
1
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
2
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…In the fourth part a deep learning (DL) algorithm of channel estimation for two fad�ing channel models, Tropical and Temperate in the satellite communication system is presented. …”
Get full text
Get full text
Thesis -
4
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…This study provides a comprehensive review of energy-efficient routing algorithms for LoRaWAN in mobile IoT applications. A systematic approach is employed, adhering to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines, to identify, evaluate, and synthesize pertinent literature, offering an in-depth exploration of existing methodologies, their advantages and limitations, and potential avenues for future research. …”
Get full text
Get full text
Get full text
Article -
5
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…Then, linguistic tagging is applied to extract software features followed by applying simple clustering algorithms to form groups of common features. In phase 4, the common features that are grouped together are passed to the feature modelling process and manual feature diagram are constructed as the final output. …”
Get full text
Get full text
Thesis -
6
-
7
Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB)
Published 2017“…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Phishing image spam classification research trends: Survey and open issues
Published 2020“…We compared the performance of the state-of-the-art image spam models. Lastly, we pointed out promising directions for future research.…”
Get full text
Get full text
Article -
9
Dynamic android malware category classification using semi-supervised deep learning
Published 2020“…Our offered dataset comprises the most complete captured static and dynamic features among publicly available datasets. We evaluate our proposed model on CICMalDroid2020 and conduct a comparison with Label Propagation (LP), a well-known semi-supervised machine learning technique, and other common machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall
Published 2013“…The performance of four artificial neural network (ANN) training algorithms was evaluated to identify the training algorithm appropriate for modeling the dynamics of soil pore-water pressure responses to rainfall patterns using multilayer perceptron (MLP) ANN. …”
Get full text
Get full text
Citation Index Journal -
12
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
13
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
14
-
15
A Comparison Study of LDPC and BCH Codes
Published 2006Get full text
Get full text
Final Year Project -
16
Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting
Published 2013“…The outputs from the individual NN models were combined by four different aggregation algorithms in NNs ensemble. …”
Get full text
Get full text
Thesis -
17
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…To evaluate the model, the model accuracy, precision, recall, F1- score, and confusion matrix were used. …”
Get full text
Get full text
Thesis -
18
-
19
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
20
Computational simulation for static and dynamic load of rectangular plate in elastic region for analysis of impact resilient structure.
Published 2012“…Further simulations are carried out using commercial codes for some sample applications to explore impact resilient structural characteristics in the elastic region.…”
Get full text
Get full text
Conference or Workshop Item
