Search Results - some contributing ((((function algorithm) OR (encryption algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
    Get full text
    Get full text
    Thesis
  3. 3

    AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR by YEO, YEO SOCK CHUANG

    Published 2013
    “…This study shows that this algorithm could add more value to the function of thin blood smear by eliminating the separated processes of detecting and counting parasitemia using two types of blood smears. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
    Get full text
    Get full text
    Thesis
  5. 5

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system by Irene Lim Jin Ying, Arif Mandangan

    Published 2024
    “…Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Online fake news detection algorithm by Sirajudeen, Sakeena M, A. Azmi, Nur Fatihah, Abubakar, Adamu

    Published 2017
    “…Due to the difficulty in preventing and evaluating what does fake news contain prior to publishing it online, if an algorithm is known for detecting fake news, then spreading online fake news wouldn’t exist in the first place, lead this paper to presents an evaluation of the effectiveness of algorithm(s), able to detect and filter to reasonable degree of accuracy what constitute an online fake news. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost) by Mohd. Zin, Zalhan, Khalid, Marzuki, Yusof, Rubiyah

    Published 2007
    “…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM by LO , TIMOTHY YIN HONG

    Published 2019
    “…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm by Mohd. Zin, Zalhan

    Published 2007
    “…Generally, a large number of features are required to be selected for training purposes. Often some of these features are irrelevant and do not contribute directly to the face detection techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This paper presents a contribution to research on norms detection by proposing a technique, which is called the Potential Norms Detection Technique (PNDT). …”
    Short Survey
  13. 13

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Cancer Prediction Based On Data Mining Using Decision Tree Algorithm by Loh, Kin Ming

    Published 2022
    “…One of the most fatal diseases nowadays in the world will be cancer. Some hereditary factors, environmental variables, and today's contemporary lifestyle all contribute to the development of cancer. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud, Moamin Ahmed, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mustapha, Aida, Mohd Yusoff, Mohd Zaliman, Abdul Hamid, Nurzeatul Hamimah

    Published 2013
    “…This paper presents a contribution to research on norms detection by proposing a technique, which is called the Potential Norms Detection Technique (PNDT). …”
    Get full text
    Get full text
    Article
  16. 16

    Fuzzy support vector machine based fall detection method for traumatic brain injuries: A new systematic approach of combining fuzzy logic with support vector machine to achieve hig... by Harum, Norharyati, Khalil, Mohamad Kchouri, Obeid, Ali, Hazimeh, Hussein

    Published 2022
    “…Hence, it became necessary to look for an effective fall detection method based on a combination of Fuzzy Logic (FL) and SVM algorithms so as to reduce false positive alarms and improve accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Structural assessment of damaged and CFRP repaired reinforced concrete beams from experimental modal analysis / Moatasem Mohammed Fayyadh by Moatasem, Mohammed Fayyadh

    Published 2012
    “…Thus in this study, new algorithms based on natural frequencies and mode shapes for damage detection are proposed to overcome some of the shortcomings which are related to reinforced concrete (RC) being a composite and heterogeneous material. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model by Mohamad Hussin, Ummu Salmah

    Published 2004
    “…A typical or fixed sigmoid function method is used in learning phase. In the recognition phase, an adaptive sigmoid function is employed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multi-Objective Optimization of Solar Powered Irrigation System by Using Genetic Algorithm by Mohd Tholaat, Muhammad Ali Husaini

    Published 2015
    “…Initial range of [1; 2] and crossover fraction of 1.0 have majorly contributed to the optimal search parameters. After some tuning to get the best setting, the simulation shows that the fitness function of 3 objectives resulted with 17.4303 kW power output, 15.2355% efficiency and $143,533.10 fiscal savings. …”
    Get full text
    Get full text
    Final Year Project