Search Results - (( cover detection method algorithm ) OR ( based instruction flow algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Image segmentation for songket motif / Zati Iwani Zaharudin by Zaharudin, Zati Iwani

    Published 2007
    “…This paper will cover on comparison of three algorithms of image segmentation, determining which algorithm is more accurate in order to extract songket motifs and a prototype of image segmentation tool using the accurate algorithm determined. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of supervised classification technique of landuse map using high resolution image / Muhammad Firdaus Mohammad Harun by Mohammad Harun, Muhammad Firdaus

    Published 2019
    “…Remote sensing have been used to detect the changes of the land covers occurs by human activity. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Assesment of robust tree detection technique for inter row trees tracking UAV based on simultaneous localization method / Norashikin M. Thamrin and Nor Hashim Mohd. Arshad by M. Thamrin, Norashikin, Mohd. Arshad, Nor Hashim

    Published 2014
    “…Most of row tracking techniques were implemented on mobile robot and the method varies in terms of sensors and algorithm used for detection for example Global Positioning System (GPS), vision based, laser, mechanical sensors and sensor fusion. …”
    Get full text
    Get full text
    Research Reports
  12. 12
  13. 13
  14. 14

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…For detecting infeasible paths that involve Object Constraints Language (OCL) constraints, new method is needed to cover all the sophisticated constructs of OCL. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin

    Published 2011
    “…The fuzzy models are trained applying locally linear model tree algorithm followed by a meta-heuristic nature inspired algorithm called bat algorithm. …”
    Get full text
    Conference or Workshop Item
  16. 16

    An embedding traid-bit method to improve the performance of Arabic text steganography by Thabit, Reema Ahmed Abdalla

    Published 2016
    “…The study presents the process design of proposed method including the algorithms and the system design. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Transient electromagnetic-thermal nondestructive testing by He, Yunze, Gao, Bin, Sophian, Ali, Yang, Ruizhen

    Published 2017
    “…Transient Electromagnetic-Thermal Nondestructive Testing: Pulsed Eddy Current and Transient Eddy Current Thermography covers three key areas of theories, methods and applications, primarily the multi-physics field, including eddy current, heat conduction and Infrared radiation for defect evaluation, lateral heat conduction, which is analyzed to detect parallel cracks, and longitudinal heat conduction, which is analyzed to detect depth defect, or that which is beyond skin depth. …”
    Get full text
    Get full text
    Get full text
    Book
  18. 18

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…Consequently, these pixels changes generate various detectable artifacts i.e. dissimilarity or significant difference errors between cover and stego-pixels, that eventually leads the steganalysis methods to exploit these effects to expose the presence of secret data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Image Based Oil Palm Tree Crowns Detection by Muhammad Afif Zakwan, Zaili

    Published 2020
    “…This system the main features is to detect the crowns of oil palm tree by drawing circle on it and covers the feature of counting for every single detection that has been made as an evaluation to ensure the system is completely done. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    ATM crime detection using image processing integrated video surveillance : a systematic review by Sikandar, Tasriva, Kamarul Hawari, Ghazali, Rabbi, M. F.

    Published 2019
    “…Despite being susceptible to crime, automated teller machine (ATM) surveillance system has not been fully integrated with image processing application for detecting criminal activity. On the other hand, the conventional state of the art image processing algorithms available for occluded and covered face detection, human abnormal behavior analysis and illegal object detection may not work for ATM having different environment (i.e. illumination and camera view), abnormal gestures, and crime devices. …”
    Get full text
    Get full text
    Get full text
    Article