Search Results - (( rate estimation methods algorithm ) OR ( between information security algorithm ))

Search alternatives:

Refine Results
  1. 1

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
    Get full text
    Get full text
    Article
  2. 2

    COMPARATIVE ANALYSIS OF OPTICAL FLOW MEASUREMENT TECHNIQUE by NIZAM AKBAR, AMAR NAZMI ZULKARNAIN

    Published 2017
    “…At that time, there was no accurate method to estimate the flow rate of the hydrocarbon leakage. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. …”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…Multilevel security is very important in Medical Emergency System MES since a database contained information with a variety of secret data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Utilization of canny and velocity bunching algorithms for modelling shoreline change by Marghany, Maged, Hashim, Mazlan

    Published 2006
    “…There is significant relationship between shoreline change rate estimated using Canny algorithm and ones modeled using velocity bunching model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…In this thesis, we considered two methods via the expectation maximization (EM) algorithm for cure rate estimation based on the BCH model using the two censoring types common to cancer clinical trials; namely, right and interval censoring. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An overview of video encryption techniques by Abomhara, Mohamed, Zakaria, Omar, Khalifa, Othman Omran

    Published 2010
    “…With respect not only to their encryption speed but also their security level and stream size. A trade-off between quality of video streaming and choice of encryption algorithm were shown. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Research Book - data engineering and information security series 1

    Published 2017
    “…Finally, Chapter 10 discusses the comparative analysis for digital artifact persistence between file format for information security.…”
    Get full text
    Get full text
    Book
  14. 14

    Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.] by Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni

    Published 2018
    “…One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Computer information and network security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Fast adaptive motion estimation search algorithm for H.264 encoder by Patwary, Md Anwarul Kaium

    Published 2012
    “…Furthermore this study presents an analysis of the performance of the proposed algorithm in terms of motion estimation time, total encoding time, video quality (PSNR), and bit rate. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm by Jati, Grafika, Rachmasari, Ardina Rizqy, Jatmiko, Wisnu, Mursanto, Petrus, Sediono, Wahju

    Published 2017
    “…The ECG signals containing a large-size of health data that must be secured. This research proposes an efficient combination of a compression and an encryption algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    A Computationally Efficient Least Square Channel Estimation Method for MIMO-OFDM Systems by Ahmad, Hasan, Motakabber, S. M. A., Anwar, Farhat, Habaebi, Mohamed Hadi, Ibrahimy, Muhammad Ibn

    Published 2021
    “…Some of the most popular methods used in cellular communication for channel estimation are the Least Squares (LS) algorithm and the Minimum Mean Square Error (MMSE) algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper