Search Results - (( cover detection method algorithm ) OR ( based instruction a algorithm ))
Search alternatives:
- method algorithm »
- cover detection »
- instruction a »
- a algorithm »
-
1
An efficient method for detecting covered face scenarios in ATM surveillance camera
Published 2020“…This paper presents a novel method to detect covered face from ATM surveillance camera images. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
5
RISC-V instruction set extension on blockchain application
Published 2024“…Towards the end of the project, the algorithms would be executed in a base RISC-V core and an extended RISC-V core using simulation tools to perform performance analysis. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Image segmentation for songket motif / Zati Iwani Zaharudin
Published 2007“…This paper will cover on comparison of three algorithms of image segmentation, determining which algorithm is more accurate in order to extract songket motifs and a prototype of image segmentation tool using the accurate algorithm determined. …”
Get full text
Get full text
Thesis -
8
Comparison of supervised classification technique of landuse map using high resolution image / Muhammad Firdaus Mohammad Harun
Published 2019“…Remote sensing have been used to detect the changes of the land covers occurs by human activity. …”
Get full text
Get full text
Thesis -
9
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…There is no determination of relative important instruction in this policy. By removing this, based on the least recent, it might cause a potential delay in the future processing if the removed instruction depends on it. …”
Get full text
Get full text
Thesis -
10
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
11
-
12
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
13
Assesment of robust tree detection technique for inter row trees tracking UAV based on simultaneous localization method / Norashikin M. Thamrin and Nor Hashim Mohd. Arshad
Published 2014“…Most of row tracking techniques were implemented on mobile robot and the method varies in terms of sensors and algorithm used for detection for example Global Positioning System (GPS), vision based, laser, mechanical sensors and sensor fusion. …”
Get full text
Get full text
Research Reports -
14
Machine learning-based change detection for land use land cover in Malaysia
Published 2025“…Two classification methods were explored: supervised and unsupervised. …”
Get full text
Get full text
Get full text
Article -
15
A Systematic Review on Cover Selection Methods For Steganography: Trend Analysis, Novel Classification and Analysis of the Elements
Published 2026journal::journal article -
16
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…For detecting infeasible paths that involve Object Constraints Language (OCL) constraints, new method is needed to cover all the sophisticated constructs of OCL. …”
Get full text
Get full text
Get full text
Thesis -
17
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
Get full text
Conference or Workshop Item -
18
An embedding traid-bit method to improve the performance of Arabic text steganography
Published 2016“…The study presents the process design of proposed method including the algorithms and the system design. …”
Get full text
Get full text
Get full text
Thesis -
19
Transient electromagnetic-thermal nondestructive testing
Published 2017“…Transient Electromagnetic-Thermal Nondestructive Testing: Pulsed Eddy Current and Transient Eddy Current Thermography covers three key areas of theories, methods and applications, primarily the multi-physics field, including eddy current, heat conduction and Infrared radiation for defect evaluation, lateral heat conduction, which is analyzed to detect parallel cracks, and longitudinal heat conduction, which is analyzed to detect depth defect, or that which is beyond skin depth. …”
Get full text
Get full text
Get full text
Book -
20
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…Consequently, these pixels changes generate various detectable artifacts i.e. dissimilarity or significant difference errors between cover and stego-pixels, that eventually leads the steganalysis methods to exploit these effects to expose the presence of secret data. …”
Get full text
Get full text
Get full text
Thesis
