Search Results - flow ((((extraction algorithm) OR (generation algorithm))) OR (encryption algorithm))
Search alternatives:
- extraction algorithm »
- generation algorithm »
-
1
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
Get full text
Get full text
Get full text
Thesis -
2
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
3
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Optimized energy extraction in tidal current technology using evolutionary algorithm
Published 2021“…It is this kind of water flow that makes tidal current suitable for power generation. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
5
An improved wavelet digital watermarking software implementation
Published 2011“…Modification was made to the algorithms where only selected matching subbands were used in embedding and extracting the watermark in this improved method. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Extract Motion from Picture Sequence
Published 2008“…Based on the assumption of the observed brightness (intensity) of any object point is constant over time interval and the movement is small, optical flow equation (OFE) is derived and used in algorithm to calculate optical flow for a particular motion. …”
Get full text
Get full text
Final Year Project -
7
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…This paper introduces TLSMalDetect, a TLS-based malware detection approach that integrates periodicity-independent entropy-based flow set (EFS) features generated by a flow feature transformation technique to solve flow feature utilization issues in related research. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
9
Hill-Climbing Search (HCS) mppt algorithm for hydrokinetic energy harnessing
Published 2022“…Various methods and techniques have been applied in hydrokinetic energy conversion systems to extract maximum power. This paper presents the performance of the Hill Climbing Search (HCS) MPPT Algorithm in hydrokinetic energy harnessing in terms of steady-state oscillation, time tracking, and efficiency. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
QUANTITATIVE SCHLIEREN MEASUREMENT OF 3 DIMENSIONAL TEMPERATURE, CONCENTRATION AND VELOCITY FIELDS IN A GAS FLOW
Published 2011“…The results showed that for a transparent gas jet all the tested optical flow algorithms worked well. However the proposed model gave better results for BOS images taken through natural gas flames and smoke from a fog generator. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Motion detection using Horn-Schunck optical flow
Published 2012“…This system is design to detect motion in a crowd using one of the optical flow algorithms, Horn-Schunck method. By performing some appropriate feature extraction techniques, this system allows us to achieve better results in detecting motion and determining the velocity of that motion in order to analyze the human behaviour based on its velocities. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
13
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
14
A method for motion tracking of ventricular endocardial surface
Published 2014“…The present invention relates to a method for automatic motion tracking of ventricular endocardial surface in three dimensional (3D) echocardiography, characterized by the steps of extracting a plurality of ventricular endocardial contours over a complete cardiac cycle; identifying a plurality of landmarks on each ventricular endocardial contour; measuring displacement vector flow (DVF) for each landmark by comparing a pair of consecutive ventricular endocardial contours; measuring velocity vector flow (VVF) for each landmark from end-diastolic (ED) to end-systolic (ES) and vice versa; identifying at least four landmarks from the plurality of landmarks on each ventricular endocardial contour to represent anatomical landmarks of left lateral surface, right lateral surface, inferior wall and anterior wall by using geometrical distance calculation (GDC) algorithm; analysing ventricular endocardial motion direction using a fuzzy logic analyzer (FLA) for the four landmarks identified; updating values of the displacement vector flow (DVF) and velocity vector flow (VVF) based on the ventricular endocardial motion direction; and generating graphical curves of time versus values of the displacement vector flow (DVF) and velocity vector flow (VVF) for the four landmarks identified.…”
Get full text
Patent -
15
Fingerprint reconstruction based on improved directional image
Published 2005“…Fingerprint image contains flow-like pattern called ridges which are separated by furrows. …”
Get full text
Get full text
Thesis -
16
-
17
Constant lock circuit for DC micro-grid system
Published 2017“…The energy conversion from water flow streams to electrical energy via Pico turbine generator is the only solution. …”
Get full text
Get full text
Get full text
Thesis -
18
Development of a multi criteria decision support system using convolutional neural network and jaya algorithm for water resources management / Chong Kai Lun
Published 2021“…The results indicated that the hydropower generated by the proposed algorithm could produce an evenly distributed high amount of energy increases the reliability of the reservoir system. …”
Get full text
Get full text
Get full text
Thesis -
19
Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System
Published 2008“…The discharge hydrographs were extracted from the grid-based overland flow routing model in ASCII format and imported into MIKE11 hydrodynamic modeling system. …”
Get full text
Get full text
Thesis -
20
Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article
Published 2010“…I used Newton Raphson for load flow algorithm and composed it with Genetic Algorithm. …”
Get full text
Get full text
Article
