Search Results - (( rate estimation methods algorithm ) OR ( between information security algorithm ))
Search alternatives:
- between information »
- estimation methods »
- methods algorithm »
- rate estimation »
-
1
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
Get full text
Get full text
Article -
2
COMPARATIVE ANALYSIS OF OPTICAL FLOW MEASUREMENT TECHNIQUE
Published 2017“…At that time, there was no accurate method to estimate the flow rate of the hydrocarbon leakage. …”
Get full text
Get full text
Final Year Project -
3
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…Multilevel security is very important in Medical Emergency System MES since a database contained information with a variety of secret data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
7
Utilization of canny and velocity bunching algorithms for modelling shoreline change
Published 2006“…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
Get full text
Get full text
Conference or Workshop Item -
8
Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data
Published 2011“…In this thesis, we considered two methods via the expectation maximization (EM) algorithm for cure rate estimation based on the BCH model using the two censoring types common to cancer clinical trials; namely, right and interval censoring. …”
Get full text
Get full text
Thesis -
9
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis -
10
An overview of video encryption techniques
Published 2010“…With respect not only to their encryption speed but also their security level and stream size. A trade-off between quality of video streaming and choice of encryption algorithm were shown. …”
Get full text
Get full text
Get full text
Article -
11
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
Get full text
Get full text
Conference or Workshop Item -
12
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
Get full text
Get full text
Get full text
Article -
13
Research Book - data engineering and information security series 1
Published 2017“…Finally, Chapter 10 discusses the comparative analysis for digital artifact persistence between file format for information security.…”
Get full text
Get full text
Book -
14
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
Published 2018“…One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Computer information and network security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. …”
Get full text
Get full text
Thesis -
17
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
18
Fast adaptive motion estimation search algorithm for H.264 encoder
Published 2012“…Furthermore this study presents an analysis of the performance of the proposed algorithm in terms of motion estimation time, total encoding time, video quality (PSNR), and bit rate. …”
Get full text
Get full text
Thesis -
19
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017“…The ECG signals containing a large-size of health data that must be secured. This research proposes an efficient combination of a compression and an encryption algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
A Computationally Efficient Least Square Channel Estimation Method for MIMO-OFDM Systems
Published 2021“…Some of the most popular methods used in cellular communication for channel estimation are the Least Squares (LS) algorithm and the Minimum Mean Square Error (MMSE) algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper
