Search Results - (( motion estimation path algorithm ) OR ( a distribution ((rsa algorithm) OR (tree algorithm)) ))*

Refine Results
  1. 1
  2. 2

    Tracking of EEG Activity Using Motion Estimation to Understand Brain Wiring by Nisar, Humaira, Malik, Aamir Saeed, Ullah, Rafi, Shim, Seongo, Bawakid, Abdullah, Khan, Muhammad Burhan, Subhani, Rauf

    Published 2014
    “…Using motion estimation it is possible to track the path from the starting point of activation to the final point of activation. …”
    Get full text
    Get full text
    Citation Index Journal
  3. 3

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Motion estimation on homogenous surface for around view monitoring system by Hanizam, Syahirah, Nik Hashim, Nik Nur Wahidah, Zainal Abidin, Zulkifli, Mohd Zaki, Hasan Firdaus, Abdul Rahman, Hasbullah, Mahamud, Nurul Hidayah

    Published 2020
    “…We propose to develop two ultra-wide-angle cameras located on the front and rear vehicle integrated with the motion estimation (ME) algorithm to produce a parking bird eye view and forward/backward trajectory lines. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  6. 6

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Encryption is the one of the most secured way using prevent unauthorized access. Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Winsorize tree algorithm for handling outliers in classification problem by Ch’ng, Chee Keong

    Published 2016
    “…Some researchers opt to perform pre-pruning or post-pruning of the CART in handling the outliers. This study proposes a modified classification tree algorithm called Winsorize tree based on the distribution of classes in the training dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Effect of waves and current on motion control of underwater gliders by Ullah, B., Ovinis, M., Baharom, M.B., Ali, S.S.A., Khan, B., Javaid, M.Y.

    Published 2020
    “…This paper investigates the effect of waves and ocean currents on the dynamics and motion control of underwater gliders. Waves and ocean currents affect a gliderâ��s performance by deviating from its desired path and reducing its operational range. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Optimum MV Feeder Routing and Substation siting and rating in Distribution Network by Hasan, Ihsan Jabbar, Ab Ghani, Mohd Ruddin, Gan, Chin Kim

    Published 2014
    “…This paper proposes an evolutionary algorithm to determine the optimum distribution substation placement and sizing by using the particle swarm optimization algorithm and optimum feeder routing using modified minimum spanning tree algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Visual servo algorithm of robot arm simulation for dynamic tracking and grasping application by Rishi Arran Suppramaniam, Mohd Hairi Mohd Zaman, Mohd Faisal Ibrahim, Seri Mastura Mustaza, Asraf Mohamed Moubark

    Published 2022
    “…Future works are required to improve the dynamic visual servo algorithm with motion planning when obstacles are present in the path of robot grasping.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Practical considerations on Quantum Key Distribution (QKD) by Al-Khateeb, Wajdi Fawzi Mohammed, Al-Khateeb, Khalid A. Saeed, Ahmad, Nur Elyana, Mohd Salleh, Siti Norussaadah

    Published 2013
    “…The field of quantum cryptography on the other hand is providing the needed highly secure keys through the introduction of quantum key distribution QKD when the quantum computing becomes a reality. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Nano-scale VLSI clock routing module based on useful-skew tree algorithm by Eik Wee, Chew, Heng Sun, Ch'ng, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
    Get full text
    Get full text
    Article
  16. 16

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Delineating mangrove forest zone using spectral reflectance by Abdul Whab @ Abdul Wahab,, Zulfa

    Published 2020
    “…Overall, the spectral reflectance measurement pairing with leaf chlorophyll measurement provides a sound basis for classifying mangrove tree species (R2>80%). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Effect of LiDAR mounting parameters and speed on HDL graph SLAM-Based 3D mapping for autonomous vehicles by Law, Jia Seng, Muhammad Aizzat, Zakaria, Younus, Maryam, Yong, Ericsson, Ismayuzri, Ishak, Mohamad Heerwan, Peeie, Muhammad Izhar, Ishak

    Published 2025
    “…While 3D mapping is foundational for reliable AV navigation, its accuracy is often compromised by poor LiDAR sensor calibration and external factors such as motion distortion. This study investigates the physical calibration of a LiDAR sensor mounted on a moving vehicle and its effect on 3D map generation using the HDL Graph SLAM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20