Search Results - (( flow ((extraction algorithm) OR (selection algorithm)) ) OR ( flow encryption algorithm ))

Search alternatives:

Refine Results
  1. 1

    An improved wavelet digital watermarking software implementation by Khalifa, Othman Omran, Yusof, Yusnita

    Published 2011
    “…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
    Get full text
    Thesis
  3. 3

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2018
    “…A fuzzy decision-making strategy is proposed and incorporated into the Jaya algorithm as selection criteria for best and worst solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Identification and Grading of Manage Using Image Processing by Shukor, Syazwan

    Published 2021
    “…Features such as maximum colour component values, pixel area and perimeter are extracted using a feature extraction algorithm for compilation into separate "sv" files for classifier and prediction models training and testing. 3 classes are selected using silhouette analysis in labelling the mango features as training references for classifiers. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    An Improved Wavelet Digital Watermarking Software Implementation by Khalifa, Othman Omran, Yusof, Yusnita, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2012
    “…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Modeling of vehicle trajectory clustering based on LCSS for traffic pattern extraction by Choong, Mei Yeen, Lorita Angeline, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2017
    “…The implementation of k-means and fuzzy c-means (FCM) clustering algorithm for vehicle flow analyzing task is served as focus in this paper. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    An approach of filtering to select IMFs of EEMD in signal processing for acoustic emission AE sensors by Mohd Jaafar, N.S., Aziz, I.A., Jaafar, J., Mahmood, A.K.

    Published 2019
    “…There is still room for the improvement in the selective accuracy of the sensitive IMF after decomposition that can influence the correctness of feature extraction of the oxidized carbon steel. …”
    Get full text
    Get full text
    Article
  14. 14

    An approach of filtering to select IMFs of EEMD in signal processing for acoustic emission AE sensors by Mohd Jaafar, N.S., Aziz, I.A., Jaafar, J., Mahmood, A.K.

    Published 2019
    “…There is still room for the improvement in the selective accuracy of the sensitive IMF after decomposition that can influence the correctness of feature extraction of the oxidized carbon steel. …”
    Get full text
    Get full text
    Article
  15. 15

    Analysis of Acoustic Emission Signal for Prediction of Corrosion on Carbon Steel Pipelines by Kafi, N.A., May, Z.B.

    Published 2021
    “…When the significant features are not considered in the training and testing of classification models, it showed a decrease in classification accuracy. Six features were selected to be used as input into the two algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A comparative study on sand transport modeling for horizontal multiphase pipeline by Choong, K.W., Wen, L.P., Tiong, L.L., Anosike, F., Shoushtari, M.A., Saaid, I.B.M.

    Published 2014
    “…There is no explicit calculation algorithm for sand transportation modeling readily available in flow simulators. …”
    Get full text
    Get full text
    Article
  17. 17

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…EvoKeyNet and KFCRNet are the proposed classification models that leverage feature extraction from optimal keyframes. EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…The selected object will be utilized for initial feature extraction and descriptor computation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Prognostic Health Management of Pumps Using Artificial Intelligence in the Oil and Gas Sector: A Review by Aliyu, R., Mokhtar, A.A., Hussin, H.

    Published 2022
    “…While the need for selecting appropriate training algorithms is seen to be significant. …”
    Get full text
    Get full text
    Article
  20. 20

    Design, Modelling And Control Of Hybrid Energy Storage System For Electric Vehicles by Taha Mohammed, Ahmed Sadeq

    Published 2021
    “…The contour positioning system (CPS) was used to extract the road slope of the selected drive cycle along the journey. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis