Search Results - (( cover detection method algorithm ) OR ( based instruction flow algorithm ))
Search alternatives:
- method algorithm »
- instruction flow »
- cover detection »
- flow algorithm »
-
1
An efficient method for detecting covered face scenarios in ATM surveillance camera
Published 2020“…This paper presents a novel method to detect covered face from ATM surveillance camera images. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
5
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Image segmentation for songket motif / Zati Iwani Zaharudin
Published 2007“…This paper will cover on comparison of three algorithms of image segmentation, determining which algorithm is more accurate in order to extract songket motifs and a prototype of image segmentation tool using the accurate algorithm determined. …”
Get full text
Get full text
Thesis -
7
Comparison of supervised classification technique of landuse map using high resolution image / Muhammad Firdaus Mohammad Harun
Published 2019“…Remote sensing have been used to detect the changes of the land covers occurs by human activity. …”
Get full text
Get full text
Thesis -
8
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
9
-
10
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
11
Assesment of robust tree detection technique for inter row trees tracking UAV based on simultaneous localization method / Norashikin M. Thamrin and Nor Hashim Mohd. Arshad
Published 2014“…Most of row tracking techniques were implemented on mobile robot and the method varies in terms of sensors and algorithm used for detection for example Global Positioning System (GPS), vision based, laser, mechanical sensors and sensor fusion. …”
Get full text
Get full text
Research Reports -
12
Machine learning-based change detection for land use land cover in Malaysia
Published 2025“…Two classification methods were explored: supervised and unsupervised. …”
Get full text
Get full text
Get full text
Article -
13
A Systematic Review on Cover Selection Methods For Steganography: Trend Analysis, Novel Classification and Analysis of the Elements
Published 2026journal::journal article -
14
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…For detecting infeasible paths that involve Object Constraints Language (OCL) constraints, new method is needed to cover all the sophisticated constructs of OCL. …”
Get full text
Get full text
Get full text
Thesis -
15
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
Get full text
Conference or Workshop Item -
16
An embedding traid-bit method to improve the performance of Arabic text steganography
Published 2016“…The study presents the process design of proposed method including the algorithms and the system design. …”
Get full text
Get full text
Get full text
Thesis -
17
Transient electromagnetic-thermal nondestructive testing
Published 2017“…Transient Electromagnetic-Thermal Nondestructive Testing: Pulsed Eddy Current and Transient Eddy Current Thermography covers three key areas of theories, methods and applications, primarily the multi-physics field, including eddy current, heat conduction and Infrared radiation for defect evaluation, lateral heat conduction, which is analyzed to detect parallel cracks, and longitudinal heat conduction, which is analyzed to detect depth defect, or that which is beyond skin depth. …”
Get full text
Get full text
Get full text
Book -
18
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…Consequently, these pixels changes generate various detectable artifacts i.e. dissimilarity or significant difference errors between cover and stego-pixels, that eventually leads the steganalysis methods to exploit these effects to expose the presence of secret data. …”
Get full text
Get full text
Get full text
Thesis -
19
Image Based Oil Palm Tree Crowns Detection
Published 2020“…This system the main features is to detect the crowns of oil palm tree by drawing circle on it and covers the feature of counting for every single detection that has been made as an evaluation to ensure the system is completely done. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
ATM crime detection using image processing integrated video surveillance : a systematic review
Published 2019“…Despite being susceptible to crime, automated teller machine (ATM) surveillance system has not been fully integrated with image processing application for detecting criminal activity. On the other hand, the conventional state of the art image processing algorithms available for occluded and covered face detection, human abnormal behavior analysis and illegal object detection may not work for ATM having different environment (i.e. illumination and camera view), abnormal gestures, and crime devices. …”
Get full text
Get full text
Get full text
Article
