Search Results - (( cover detection method algorithm ) OR ( based instruction a algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  5. 5

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Image segmentation for songket motif / Zati Iwani Zaharudin by Zaharudin, Zati Iwani

    Published 2007
    “…This paper will cover on comparison of three algorithms of image segmentation, determining which algorithm is more accurate in order to extract songket motifs and a prototype of image segmentation tool using the accurate algorithm determined. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparison of supervised classification technique of landuse map using high resolution image / Muhammad Firdaus Mohammad Harun by Mohammad Harun, Muhammad Firdaus

    Published 2019
    “…Remote sensing have been used to detect the changes of the land covers occurs by human activity. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…There is no determination of relative important instruction in this policy. By removing this, based on the least recent, it might cause a potential delay in the future processing if the removed instruction depends on it. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Assesment of robust tree detection technique for inter row trees tracking UAV based on simultaneous localization method / Norashikin M. Thamrin and Nor Hashim Mohd. Arshad by M. Thamrin, Norashikin, Mohd. Arshad, Nor Hashim

    Published 2014
    “…Most of row tracking techniques were implemented on mobile robot and the method varies in terms of sensors and algorithm used for detection for example Global Positioning System (GPS), vision based, laser, mechanical sensors and sensor fusion. …”
    Get full text
    Get full text
    Research Reports
  14. 14
  15. 15
  16. 16

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…For detecting infeasible paths that involve Object Constraints Language (OCL) constraints, new method is needed to cover all the sophisticated constructs of OCL. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin

    Published 2011
    “…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
    Get full text
    Conference or Workshop Item
  18. 18

    An embedding traid-bit method to improve the performance of Arabic text steganography by Thabit, Reema Ahmed Abdalla

    Published 2016
    “…The study presents the process design of proposed method including the algorithms and the system design. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Transient electromagnetic-thermal nondestructive testing by He, Yunze, Gao, Bin, Sophian, Ali, Yang, Ruizhen

    Published 2017
    “…Transient Electromagnetic-Thermal Nondestructive Testing: Pulsed Eddy Current and Transient Eddy Current Thermography covers three key areas of theories, methods and applications, primarily the multi-physics field, including eddy current, heat conduction and Infrared radiation for defect evaluation, lateral heat conduction, which is analyzed to detect parallel cracks, and longitudinal heat conduction, which is analyzed to detect depth defect, or that which is beyond skin depth. …”
    Get full text
    Get full text
    Get full text
    Book
  20. 20

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…Consequently, these pixels changes generate various detectable artifacts i.e. dissimilarity or significant difference errors between cover and stego-pixels, that eventually leads the steganalysis methods to exploit these effects to expose the presence of secret data. …”
    Get full text
    Get full text
    Get full text
    Thesis