Search Results - (( cover detection method algorithm ) OR ( based information based algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    ATM crime detection using image processing integrated video surveillance : a systematic review by Sikandar, Tasriva, Kamarul Hawari, Ghazali, Rabbi, M. F.

    Published 2019
    “…To achieve these goals, this review summarizes the information based on abnormality detection, features, system framework and methodology, image acquisition, sample specification, performance analysis and project funding. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Sarcasm detection in Persian by Nezhad, Zahra Bokaee, Deihimi, Mohammad Ali

    Published 2021
    “…The performance of the model is analysed using several standard machine learning algorithms. The results of the experiment showed that the method outperformed the baseline method and reached an accuracy of 80.82%. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Prototype development for embedding large amount of information using secure LSB and neural based steganography by Saleh, Basam N.

    Published 2009
    “…The challenge to Steganography is the amount of information to be embedded in the host file without affecting the properties of that file and to avoid distortion of the image, the video, or the sound host file and as a result, to avoid detection of hidden information existence. The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image by Samsudin, Sarah Hanim

    Published 2016
    “…Normal supervised pixel-based classification scheme is often applied to map urban land use and land cover which the accuracy is dependent on the training site information. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An analysis of alphabet-based techniques in text steganography by Osman, Baharudin, Yasin, Azman, Omar, Mohd Nizam

    Published 2016
    “…Steganography and cryptography are methods in information hiding.Cryptography scrambles the secret message, whereas steganography conceals a secret message in a carrier medium.An audio, video, image, and text can be used as a cover medium for hiding messages in steganography. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region by Fanos, Ali Mutar

    Published 2016
    “…In this study, rockfall source areas were identified using multi-criteria method based on DEM derivates, terrain type or land use/cover (LULC) and high spatial resolution aerial photo (13cm). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Processing and classification of landsat and sentinel images for oil palm plantation detection by Mohd Ibrahim, Azhar, Asming, Muhammad Anwar Azizan, Abir, Intiaz Mohammad

    Published 2022
    “…One of the capabilities of remote sensing is the detection of oil palm plantations. Therefore, this paper attempts to determine the best methods for image classification, especially for land cover classification of oil palm plantations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Facial age range estimation using geometric ratios and hessian-based filter wrinkle analysis by Razalli, Husniza

    Published 2016
    “…The Hessian-Based Filter is used to enhance wrinkle analysis for age range estimation method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The finalized configuration that resulted in the best response was adopted and used to collect data for training and classifying the gait phase using pattern recognition method. The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Characterizing land use/land cover change dynamics by an enhanced random forest machine learning model: a Google Earth Engine implementation by Pande C.B., Srivastava A., Moharir K.N., Radwan N., Mohd Sidek L., Alshehri F., Pal S.C., Tolche A.D., Zhran M.

    Published 2025
    “…By incorporating these bands, the models were able to influence the spectral information captured by each band to classify the LULC categories accurately. …”
    Article
  16. 16

    An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction by Ahanin, Fatemeh

    Published 2023
    “…In the third method, a hybrid algorithm called LSTM-C-EST, which is a combination of Fuzzy-MDL and LSTM-C is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Imaging of solid flow in a gravity flow rig using infra-red tomography by Md. Yunus, Mohd. Amri

    Published 2005
    “…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
    Get full text
    Get full text
    Thesis
  18. 18

    The land surface temperature impact to land cover types by Ibrahim, Illyani, Abu Samah, Azizan, Fauzi, Rosmadi, Hj. Mohd. Noor, Norzailawati

    Published 2016
    “…The method used in this research was supervised classification for land cover map and mono window algorithm for land surface temperature (LST) extraction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…Groundwater quality assessment based on the data obtained from arbitrary sampling wells might be presented redundant or shortage of information. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Geospatial Based Application for Dam Planning and Monitoring in Malaysia: A Review by Deros S.N.M., Jalal K.A., Ishak N.A., Din N.M., Naim M.R.

    Published 2024
    “…The study reviewed in this paper includes the change detection pattern of land use and land cover (LULC), its influence on sediment yield and soil erosion. …”
    Book chapter