Search Results - (( java applications security algorithm ) OR ( frames extraction based algorithm ))
Search alternatives:
- java applications »
- frames extraction »
- extraction based »
-
1
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
2
-
3
-
4
Three-phase three-level shunt active power filter with simplified synchronous reference frame
Published 2016“…In its controller, Synchronous Reference Frame (SRF) principle has widely been applied in current harmonics extraction algorithm due to its simple implementation features. …”
Get full text
Get full text
Conference or Workshop Item -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
A simplified synchronous reference frame for indirect current controlled three-level inverter-based shunt active power filters
Published 2016“…This paper presents a new simplified harmonics extraction algorithm based on the synchronous reference frame (SRF) for an indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
Get full text
Get full text
Article -
7
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
8
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
9
Automated threshold detection for object segmentation in colour image
Published 2016“…In solving this issue, this paper presents an Automated Threshold Detection Algorithm, H(•). The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A wavelet based watermarking algorithm for video
Published 2005“…In this paper, a video watermarking algorithm based on wavelets is proposed. In this algorithm, to achieve better imperceptibility and robustness a binary image watermark is inserted into the middle frequency subband coefficients of the blue component of the video frame. …”
Get full text
Get full text
Conference or Workshop Item -
11
Time normalization of LPC feature using warping method
Published 2005“…The processed features are pitch and Linear Predictive Coefficients (LPC) for input and reference templates, based on Dynamic Time Warping (DTW) algorithm. The first task is to extract pitch features using Pitch Scale Harmonic Filter (PSHF) algorithm. …”
Get full text
Get full text
Get full text
Article -
12
DTWFF-pitch feature and faster neural network convergence for speech recognition
Published 2007“…The processed features are pitch and Linear Predictive Coefficients (LPC) for input and reference templates, based on Dynamic Time Warping (DTW) algorithm. The first task is to extract pitch features using Pitch Scale Harmonic Filter algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Gender identification of children using hidden Markov model based on Mel-frequency cepstral coefficient / Adira Ibrahim
Published 2013“…Mel Frequency Cepstral Coefficient (MFCC) was applied as the feature extraction method. HMM was trained with Baum-Welch algorithm and tested with Viterbi algorithm to get the gender identification accuracy. …”
Get full text
Get full text
Thesis -
15
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
Get full text
Get full text
Student Project -
16
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Whenever an area with the similar characteristic is verified in the next frame, the area will be identified and bounded with a rectangle through the object recognition algorithm of the research. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
18
Multiform Frame Shape Extraction Using Neighbouring Pixel Be-Haviors For Mushaf Al-Quran
Published 2019“…This paper will focus on how to extract Al-Quran text from its decorative illumination frame. …”
Get full text
Get full text
Get full text
Article -
19
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
20
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item
